August 27, 2015 By David Strom 2 min read

Earlier this summer, MasterCard announced a new multifactor authentication option for its cardholders: the selfie. Customers will soon be able to incorporate a selfie and facial recognition software into their accounts. The pilot program starts in the fall and will incorporate fingerprint scanning as well as facial recognition. Users will need to download an app to their smartphones to enable the new authentication methods, but if used successfully, the process should strengthen account logins and reduce the risk of identity theft.

Certainly, fingerprint identification has become more popular; readers are now found on most new smartphones. But getting this tool adopted by the B2B world might take some time, especially given the reluctance that many IT managers have over these technologies.

Tony Maro, the CIO for West Virginia medical records software vendor EvriChart, explained some of the possible benefits — and disadvantages — in an interview with Security Intelligence. “This may help reduce some online fraud. But it could be a mixed bag,” he said. “This isn’t about preventing people from stealing your credit card number. It’s about stopping the consumer from contesting purchases as a way to avoid paying for them.”

Another issue to consider is what happens to the digitized facial and fingerprint databases. Implementing these authentication measures gives enterprises the ability to collect the biometric data of potentially millions of individuals — and that information would be a gold mine for cybercriminals.

“This now becomes just another piece of data about you that’s going to be leaked in a data breach,” Maro explained. The storage of this data could become an issue for privacy advocates and yet another data store of personal information that needs to be tracked by intrusion detection and firewall software.

Finally, there is the reliability of the underlying technologies, which could be holding back companies from widespread adoption. “One-third of the time, my fingerprint still doesn’t unlock my cellphone,” said Maro. This could be why few of the multifactor or single sign-on vendors currently offer support for smartphone fingerprint readers. Part of the problem was that both Android and iOS didn’t have very robust application programming interfaces to support their readers until relatively recently, but the rollout has still been slow.

And facial recognition software is still not very accurate: Google’s software, for example, frequently misidentifies dogs as horses and kangaroos. “I’ve personally had a photo of Patrick Stewart autotagged as me on a friend’s Facebook stream once,” said Maro. While this may not seem so egregious at first glance, it’s a microcosm of the larger problems related to biometric authentication.

Still, the MasterCard selfie experiment in multifactor authentication is worth following when it is introduced this fall. Should this method of biometric authentication take off, it could soon be implemented at other institutions for security involving customers and employees alike.

To learn more about how organizations can move beyond usernames and passwords to achieve more modern, secure authentication, watch the on-demand webinar from IBM and Kuppinger Cole,  titled, “Beyond Usernames and Passwords: 3 steps to Modern Authentication.”

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today