BID® Daily Newsletter
Dec 9, 2015

BID® Daily Newsletter

Dec 9, 2015

Mess With A Horny Toad And You'll Get Messy


For those who grew up in AZ, you know a Horny Toad is not something to mess with. While not as risky as playing with its bigger cousin the Gila monster or a rattlesnake, these toads have their own predator protections built right in. When attacked, the Horny Toad squirts a stream of blood from the corners of their eyes that can launch up to 5 feet. In the ensuing chaos and confusion of the predator that has just been blasted, this wily critter scampers off into the desert.
Given the potential for a lawsuit, we obviously cannot recommend banks incorporate such defense mechanisms when it comes to cyber security. Instead, it makes more sense to move rapidly toward a future where methods like tokenization, biometrics and multifactor authentication will be the new normal to fend off attackers.
Let's start with tokenization and why it's so important. A token is nothing more than a reference that maps back to more sensitive data at the bank. In short, it replaces account information with a secure alternative. Unlike a personal account number, it is also useless if stolen. Here's how it works in simple terms. A person's card number is substituted by an alias number (token) that links back to the customer's real account through a highly secure server known as a vault. The token can be used the same way as a credit card number, but with this method, even if a retailer's system is comprised, thieves can only get the tokenized data.
A whole lot more is going on in the world of biometrics these days as well. In its simplest form, biometrics makes you the password. It includes fingerprints, eyes, voice, face, vein and signature patterns. This is important because Acuity research predicts biometrics will be used to authenticate 65% of all mobile commerce transactions in the next 5Ys. Today, research by Biometix finds usage of biometric technologies among banks by type is approximately: fingerprint (48%), finger vein (12%), voice (11%), hand vein (9%), iris (7%), signature (6%), hand geometry (5%) and face (3%). However, given the popularity of the smartphone, voice, face and finger are quickly jumping to the top of the list. The major bank leader in all of this is USAA who has already rolled out biometrics. They say customers love it and indicate finger and face take about 2 seconds to authenticate, while voice recognition takes about 20 seconds.
In terms of enhancing security, there is still room to improve but things are getting better. In fact, a recent Fed report found banks use the following methods to enhance security: multifactor authentication (84%); time out due to inactivity (78%); encryption (55%); mobile device ID (54%); mobile notifications (53%); out-of-band authentication (36%); geo-location (21%); tokenization (10%) and biometrics (6%).
Banks will always be targets of cybercriminals because that's where the money is of course. So, some ways to protect yourself include staying vigilant, using multifactor authentication, getting vulnerability assessments, protecting your data, shredding documents, having a data breach response program, rehearsing likely scenarios, having good insurance, having layered security and preparing as much as you can. It is impossible to stop a country with limitless resources from hacking your little bank, but you can certainly try to manage and mitigate risk.
Predators will always sniff around trying to find prey, so in the cyber and security world it's up to your bank to continually evolve to protect yourself and your customers.
Subscribe to the BID Daily Newsletter to have it delivered by email daily.