{"id":4577,"date":"2013-10-17T14:16:00","date_gmt":"2013-10-17T14:16:00","guid":{"rendered":"https:\/\/evssolutions.com\/touch-id-biometrics-and-kba-work-in-perfect-harmony\/"},"modified":"2013-10-17T14:16:00","modified_gmt":"2013-10-17T14:16:00","slug":"touch-id-biometrics-and-kba-work-in-perfect-harmony","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/touch-id-biometrics-and-kba-work-in-perfect-harmony\/","title":{"rendered":"Touch ID Biometrics and KBA Work In Perfect Harmony"},"content":{"rendered":"

There have been a
\nlot of rumors around the new iPhone feature, a fingerprint scanner, related to
\nidentity theft and fraud. This technology is supposed to improve security for
\nthe user, but its still under speculation by many. The fingerprint sensor
\nreads the users fingerprint in order to unlock and allow access to the phone.<\/span><\/span><\/p>\n

Biometric
\ntechnology is exciting on all fronts, from security to electronics, but its
\nnothing new. Biometrics is defined as the
\nmeasurement and analysis of unique physical or behavioral characteristics (such
\nas fingerprint and voice patterns) especially as a means of verifying personal
\nidentity.<\/span><\/span>Biometric
\ntechnology is not limited to fingerprint and voice recognition.<\/span>The
\nuses of biometrics are abundant and can be very beneficial. <\/span><\/span><\/span><\/p>\n

So
\nthen the question is, are biometrics enough to verify and secure an identity?
\nWhile its convenient to unlock your phone with your fingerprint, how effective
\nis it within larger applications? Were sure consumers wouldnt feel secure
\nregistering a new online bank account or credit card with just their
\nfingerprint. There is also concern about whether or not biometric technology
\nalone can give organizations the confidence that their customers need to
\npartner with them.<\/span><\/p>\n

We never recommend
\nusing just one technology in a <\/span>fraud prevention strategy<\/span><\/a>. The key to success is <\/span>layered security<\/span><\/a>. When it comes to biometrics, we all want
\nto know: How is the fingerprint validated? What happens when a copied fingerprint
\nis used? What happens if the database of fingerprints gets hacked?<\/span><\/p>\n

With passwords, you
\ncan easily and quickly change them if an account is compromised. What about
\nyour fingerprint? You most certainly cant get a new one. Identity verification
\nand biometrics can work together by verifying initial verification and
\nauthentication. By utilizing the ability of <\/span>
dynamic knowledge based authentication<\/span><\/a> (KBA) and out of wallet questions, you can ensure
\nthe identity of that fingerprint is who its supposed to be and not a fraudster.
\nThis process of layered security leads to faster approvals, as well as a more
\nsecure customer experience thats proven to prevent fraud.<\/span><\/p>\n

The use of <\/span>biometrics<\/span><\/a> alone can be dangerous and will not be able to identify an individual
\nalone. Implement robust <\/span>
identity verification<\/span><\/a> and KBA to sustain and enhance your fraud
\nprevention strategy. <\/span><\/p>\n


<\/span><\/p>\n

<\/span><\/p>\n

[Contributed by EVS
\nMarketing]<\/span><\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

There have been a lot of rumors around the new iPhone feature, a fingerprint scanner, related to identity theft and fraud. This technology is supposed to improve security for the user, but its still under speculation by many. The fingerprint<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4577"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4577"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4577\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}