Just released: How to raise venture capital in 2023

Download

A Brief Look at User Authentication Techniques

Carl Niedbala - Founder Shield
Carl Niedbala

COO & Co-Founder

 

Almost every client we work with stores or uses some sort of Personal Identifiable Information (“PII”).  This probably reflects our apparent desire to have seamless/uber equivalents for literally every possible purchase of goods and services.  In any case, there’s a lot of personal data floating around the interwebs these days.  That should make security and user authentication techniques a priority for any tech company considering there’s roughly $560 Million in consumer internet fraud each year, some of which is recovered through class action suits against companies.  So what’s been going on in the authentication space? Here are a couple updates:

CAPTCHA

When I thought about writing this post, the first thing that came to mind was to look up stats on CAPTCHA use.  It’s sort of the ubiquitous authentication solution and its used by huge companies everywhere.  To me, CAPTCHA is synonymous with making a purchase on the Ticketmaster site, for example.

One company is working on a new technology that seems to ensure CAPTCHA is on its way out sooner than later.  San Francisco-based Vicarious is that company.  What they’re doing is taking the concept of machine learning and applying it in a more human-like fashion.  Instead of thousands of data points, their program needs only 10 to effectively learn, say, the general shape of a letter.  It’s even able to recognize shapes in picture format (i.e. the letters of a CAPTCHA).  Vicarious may or may not be the ones to eventually put machine learning on parity with that of humans, but we’re headed that way.

SMS

CAPTCHA’s been around for what seems like forever, but there are new players in the space these days.  One that’s gaining a ton of popularity is the two-factor authentication test using SMS.  For example, Facebook and Google started using this method within the last few months.If you’ve never seen this before, it works by sending you a text when you log into your account from a new location or device.  You type the code from the text into the appropriate field, and voila! You’re in.

It’s easy to understand why SMS-based authentication is gaining steam: multiple layers of authentication less a terribly intrusive or annoying user experience.  User’s don’t have to flip back and forth between their browser and email client to get the job done.  No need to leave the authentication page!

This method is a marked improvement from the CAPTCHA method…or is it?  Multiple layers of authentication means more security, but it also means a more complex system must be in place to process each layer.  As any product guy will tell you, the more moving parts, the more things that can break.  The situation is no different here.

Another potential issue with this method is that it creates the potential for multiple points of attack.  There’s now valuable information being pushed to multiple devices.  As SMS-based authentication use expands it’ll be interesting to monitor how the hacking landscape skews (if at all) towards mobile attacks.

That’s just a quick look at some of the most commonly used authentication techniques.  Regardless of what methods are used, there’s always a chance your company will be sued for data breach (whether or not it’s even your fault!).  And until some utopian society exists where these techniques and all security measures are perfected, you can take solace in the fact that you’re covered with a good cyber liability policy…

Interested in figuring out what a good cyber liability policy for you might look like? Give us a ring at 6468541058 or shoot an email to info@foundershield.com and we’ll be happy to chat!

Related Articles

Legal Risks for SaaS Companies
December 5 • Risk Management

Top 5 Legal Risks for SaaS Companies in 2024

SaaS companies are on the forefront of innovation but face legal risks that leaders must understand. Here are SaaS risks to watch in 2024.

Cybersecurity Data Breaches
November 9 • Cyber Liability

Top 10 Cybersecurity Data Breaches of 2023

oday’s digital landscape is frightening for business leaders. Here’s a glimpse into some of the most cringe-worthy data breaches in 2023 — plus, how to avoid them.

What Is a BOR Letter
July 27 • Risk Management

What Is a BOR Letter or Broker of Record Letter?

What is a BOR letter? Can it help you manage your specialized insurance solutions? We have the answers — and they may surprise you!

Risk Management for Regulation Technology
July 20 • Risk Management

RegTech Insurance: Risk Management for Regulation Technology

Regtech insurance is specifically designed for regulation technology companies — but what risks do regtech companies face? Let’s discuss some prominent challenges and solutions for this sector.

Cyber Insurance Pricing Trends
July 19 • Cyber Liability

Cyber Insurance Pricing Trends 2023

After a hard-hit 2022, let’s explore the lessons learned, what currently impacts the cyber market, and cyber insurance pricing trends to expect in the future.

How Uplisting Stocks Works
June 13 • Risk Management

How Uplisting Stocks Works: From OTC to Nasdaq or NYSE

Uplisting from OTC to Nasdaq or NYSE is a significant step for late-stage companies – but how does it all unfold? Let’s discuss uplisting in detail.