Be Your Own Bodyguard
We talk about cyber security a lot. That’s not only because it’s our industry, but also because cyber attacks are happening more frequently than ever. Sony’s attack was proof that hackers are after a lot more than money. According to a recent report by CBS, companies are uncovering ways to use the biology of individuals as a key into their own devices. Yes, you read that right.
Password manager TrueKey, by Intel, uses facial recognition that won’t allow anyone to access your device until it recognizes your face. More impressively, it then fills in your passwords for different sites. Oh and it can tell the difference between your actual face and a picture or video of you. Not to mention your changing hairstyles, facial hair, and whether or not you're wearing your glasses. ArcSoft's Simplicam brings facial recognition to security cameras that recognize different people's faces and when the camera detects an unfamiliar face, it sends a customized alert.
Some technologies are using your internal biology as proposed to your eternal features. The Nymi band reads your electrocardiogram (ECG), the electrical current your heart generates, to unlock your computer sans password.
With products like these emerging, the character-filled password might become a thing of the past. We imagine the technology industry will be quick to experiment with this new approach. With this improved security technology comes some additional risk that companies should take into consideration before implementing. First, as the cost of many of these systems can be significant, companies should do a cost benefit analysis to ensure that the cost of the system is worth the benefits it provides. Second, employers should take into consideration the employee privacy issues that could arise with the use of bio-tech security system. The data being collected and utilized may require additional policies on who has access and how it’s stored. Finally, companies should consider the potential negative effect of having too much security, which may inhibit a company’s ability to efficiently conduct business. Additional questions? Ask an 'A' Team member.
- Assurance University Data Breach Webinar
- The Growing Risk of Cyber Liability
- Assessing Your Risk for a Cyber Breach & Minimizing the Fallout
- Cyber Liability E-Book
ABOUT THE AUTHOR