Authentication can sometimes feel like a balancing act. On one hand, securing your digital experience is a top priority. Preserving your customers’ trust in your services is often key to maintaining a long-term relationship with your brand. On the other hand, in the age of digital transformation, customers also want a simple, easy-to-navigate digital experience.

Too often, security and user experience are at odds with one another. Extra security can mean extra roadblocks on the customer’s digital journey. It’s hard enough to remember all your usernames and passwords. Factor in two-factor authentication (2FA), SMS text messages and more, and you’re very likely to have frustrated users.

Risk-Based Authentication Today

One strategy that can help address these problems is risk-based authentication (RBA). This method involves creating various levels of authentication based on a risk score and built from the risk factors found for each user or activity. In these scenarios, organizations look for users that show anomalous behavior. Perhaps they are using a different device than normal, or accessing their accounts from a different location. In these cases, they will “step up” authentication requirements, only forcing their most risky users to go through the additional step of multifactor authentication (MFA). Then, the remaining low-risk users only need to complete basic authentication steps.

Risk-based authentication is considered an improvement over the alternatives, forcing all users to complete multifactor authentication or having no users complete it. For many organizations, high-risk users make up less than 1 percent of their user population, so there can potentially be considerable savings on operational costs around MFA.

However, RBA strategies still present challenges. Sophisticated attackers may be able to appear as lower-risk users, perhaps using an emulator to mimic a true device. In addition, the vast majority of your low-risk users are still being asked to deal with usernames and passwords — which, at best, can be frustrating to the user experience.

From Measuring Risk to Measuring Trust

What, then, is the alternative? Business leaders must expand their view beyond just fraud and risk detection. A more robust and modern way to address the challenges of security and user experience could be to bring identity to the table, moving from risk scoring to trust scoring. By analyzing both risk indicators and positive identity indicators (behavioral biometrics, user routines, etc.), organizations can understand the context of a user, their behavior, and where they sit on a spectrum of digital identity trust and risk.

The Future of Authentication Can Be Seamless and Adaptive

Trust scoring can allow organizations to build customized, granular options for the full spectrum of user behaviors. The highest-risk users could still be blocked, but those who are only medium-risk could be allowed in with restrictions on what information they are able to access or what size transactions they are able to complete. Low-risk users — those with a minor anomaly, such as a new device — might be asked to authenticate. Highly trusted users — those who are using a known device with behavioral biometric matches — could even be served a frictionless, passwordless authentication experience.

Security, Meet User Experience

So, can authentication hurt the user experience? In many cases, it can — but it doesn’t have to. When done well, with a strategy based on trust that combines fraud and identity indicators, authentication can be a seamless and adaptive experience.

More from Fraud Protection

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today