August 27, 2015 By David Strom 2 min read

Earlier this summer, MasterCard announced a new multifactor authentication option for its cardholders: the selfie. Customers will soon be able to incorporate a selfie and facial recognition software into their accounts. The pilot program starts in the fall and will incorporate fingerprint scanning as well as facial recognition. Users will need to download an app to their smartphones to enable the new authentication methods, but if used successfully, the process should strengthen account logins and reduce the risk of identity theft.

Certainly, fingerprint identification has become more popular; readers are now found on most new smartphones. But getting this tool adopted by the B2B world might take some time, especially given the reluctance that many IT managers have over these technologies.

Tony Maro, the CIO for West Virginia medical records software vendor EvriChart, explained some of the possible benefits — and disadvantages — in an interview with Security Intelligence. “This may help reduce some online fraud. But it could be a mixed bag,” he said. “This isn’t about preventing people from stealing your credit card number. It’s about stopping the consumer from contesting purchases as a way to avoid paying for them.”

Another issue to consider is what happens to the digitized facial and fingerprint databases. Implementing these authentication measures gives enterprises the ability to collect the biometric data of potentially millions of individuals — and that information would be a gold mine for cybercriminals.

“This now becomes just another piece of data about you that’s going to be leaked in a data breach,” Maro explained. The storage of this data could become an issue for privacy advocates and yet another data store of personal information that needs to be tracked by intrusion detection and firewall software.

Finally, there is the reliability of the underlying technologies, which could be holding back companies from widespread adoption. “One-third of the time, my fingerprint still doesn’t unlock my cellphone,” said Maro. This could be why few of the multifactor or single sign-on vendors currently offer support for smartphone fingerprint readers. Part of the problem was that both Android and iOS didn’t have very robust application programming interfaces to support their readers until relatively recently, but the rollout has still been slow.

And facial recognition software is still not very accurate: Google’s software, for example, frequently misidentifies dogs as horses and kangaroos. “I’ve personally had a photo of Patrick Stewart autotagged as me on a friend’s Facebook stream once,” said Maro. While this may not seem so egregious at first glance, it’s a microcosm of the larger problems related to biometric authentication.

Still, the MasterCard selfie experiment in multifactor authentication is worth following when it is introduced this fall. Should this method of biometric authentication take off, it could soon be implemented at other institutions for security involving customers and employees alike.

To learn more about how organizations can move beyond usernames and passwords to achieve more modern, secure authentication, watch the on-demand webinar from IBM and Kuppinger Cole,  titled, “Beyond Usernames and Passwords: 3 steps to Modern Authentication.”

More from Identity & Access

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today