Securing the new tide of biometric authentication tools

David Higgins, EMEA technical director at CyberArk, discusses the increasing prevalence of biometric authentication tools and the steps needed to use them securely

Biometric fingerprint readers, facial recognition systems, and retinal scanners were once reserved for the likes of Tom Cruise and James Bond in their respective ‘secret agent’ film franchises. In order to penetrate a heavily-fortified and high-tech facility, Cruise would take on an impossible mission and, more often than not, resort to neutralising an unknowing guard, pressing the guard’s finger against a scanner (similar to the ones used by airports for e-passports), and slipping into the building entirely unnoticed. But this kind of tech is now more commonly used for breaching the security of iPhones and other mobile devices, as opposed to that of a high-security compound. 

In the space of a few years, biometric authentication has quickly become very popular.

This progress has prompted many organisations to explore this technology as a way to protect their sensitive data and to ensure that the right person has access to the right device at the right time. 

However, whilst some information security experts believe biometric technology is the future of digital security, others voice growing concerns around privacy. But, before we assess the risks and rewards, here’s an overview.

Biometric facial recognition technology

A brief overview of biometric authentication

To work for identification and access control purposes, biometric markers must be completely unique to an individual, recordable and permanent. Examples of biometric data include a person’s unique facial structure, the minute ridges of a fingerprint, the one-of-a-kind patterned iris encircling a pupil in the eye, the unique sound waves of a person’s voice (or “voiceprint”), the geometry of a hand or the way a person interacts with a computer system (a typing cadence or mouse usage for example). These ‘unique human identities’ are collected, stored and matched in a database, providing a secure way for users to log into a host of devices or systems without having to use (and remember) multiple passwords.

And this isn’t just future-gazing technology. A recent survey conducted by CyberArk among UK office workers revealed that many organisations are beginning to integrate cutting-edge new security technologies into their strategies, with nearly one in five (19%) reporting that their IT security team is experimenting with biometric security techniques, including fingerprint and retinal scans and embedded microchips.


READ MORE: Millions of fingerprints leaked in latest high-profile data breach


DNA is forever, a password is not

This technology has clear benefits, but businesses cannot afford to overlook the plethora of security and privacy concerns that come with implementing biometric authentication.

Firstly, there is a significant difference between a hacker getting their hands on a fingerprint rather than a password – after all, you cannot change your DNA. This leaves your devices vulnerable and exposed. Furthermore, the permanence of biometric authentication could easily lead some individuals and organisations to become overly confident in the technology and focus less on robust cybersecurity best practices such as multi-factor authentication (MFA), needed to thoroughly secure employee devices.

Savvy hackers will – and in many cases are already – trying to exploit biometric technology for digital and physical authentication. According to reports from Motherboard, some hackers have allegedly cracked hacking vein authentication technology by making fake hands out of wax. Whilst this is an extreme and unusual example, this just proves the lengths that hackers are willing to go to, and businesses have to stay one step ahead of the curve to combat all kinds of threats.

Biometric facial recognition technology

Beware hacks of all shapes and sizes

Here are just a few ways attackers are targeting unique human identities to gather massive amounts of biometric data for future modelling purposes and nefarious use:

Genetic consumer services 

If you’ve ever taken an at-home DNA test, your unique genetic information is now in the hands of an organisation you probably have limited knowledge of. Last June, genealogy testing service MyHeritage revealed that 92 million accounts were found on a private server. While personal DNA was not compromised in this instance, it demonstrates the potential for far-reaching damage in the case of a successful breach.

Embedded human microchips 

According to the biohacking company Dangerous Things, between 50,000 and 100,000 people today sport an embedded microchip, which they use to do things like unlock their office door, get into the gym, buy lunch and simplify travel. Yet, a number of security researchers have demonstrated ways to successfully hack into these chip implants – from infecting a chip with a virus through a SQL injection attack to conduct a URL attack on a browser vulnerability on an NFC chip.

Biometric stores within organisations 

As adoption of biometric authentication grows, huge amounts of highly sensitive data are being collected, stored on-premises and in the cloud, processed and accessed with minimal protection or oversight. Cyber attackers are increasingly targeting data stores within organisations, understanding that many have not implemented the appropriate technical and organisational measures needed to keep this sensitive data secure.

Whilst biometric technology is no longer the stuff of science fiction, we do believe it has a long way to go to be implemented at scale across large businesses.  We have to stay one step ahead of the hackers and anticipate their ability to hack into biometric technology at any time. Doing this will require robust cybersecurity measures such as MFA. There is more at stake here than just financial and reputational damages and losses to businesses – this is about protecting our unique human identities. It’s time to wise up to the risks that biometric technologies can pose and take the necessary steps to combat them.

David Higgins

David Higgins is EMEA technical director at CyberArk, a global leader in privileged access management. CyberArk is trusted by more than half of the Fortune 500 companies to protect their high-value assets.

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...

Custom Software Development

Natalia Yanchii • 03rd October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 03rd October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing.