Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical Security

Corporate entities and retailers are scrambling to shore up network security by addressing the primary vulnerability of network security: the login. Unique “behavioral” biometric may be the solution.

Are Login Credential Vulnerabilities the Root of Data Breaches?

By Jeff Elliott
cyber 3 feat
February 10, 2015

Welcome to the “Age of the Cyber Attack.”

Staggering numbers from security experts suggest that over 95 percent of all corporations have experienced a data breach of some kind – many of which can go undetected for months or years.  

In the wake of the Sony hack and other high profile data breaches at Target, Home Depot, Michaels, Chase and other institutions, corporate IT departments are searching to for solutions that will immediately shore up network security.

At the heart of this search is finding a solution that addresses the primary vulnerability of network systems, the user login.

Accessing a network through obtaining the login of a credentialed user is at the heart of the majority of high profile internet data breaches of the past year. The CBS News program “60 Minutes” called 2014 “the year of the data breach,” and went on to state that forensic evidence showed that 80 percent of security breaches were caused by stolen or weak passwords.

Once inside the network, cyber hackers are able to install information-stealing malicious software that can reside undetected on corporate servers for months – even years – capturing credit card and other information while slowly expanding its reach.

At the root of this dilemma is how to effectively authenticate an individual accessing the network with an extremely high degree of accuracy.

To be effectively implemented the solution must also meet two additional criteria: it must be user-friendly and require no additional hardware beyond a normal computer, tablet or smartphone device.

Security experts are working on a solution that is based on unique human characteristics called biometrics.

The Trouble with Logins

The difficulty with login credentials is that they are based on possessing specific pieces of information, most commonly a username and PIN/password.  Armed with that information, users can access everything from medical records and bank accounts, to credit card information, e-mails and other sensitive information.

The problem, of course, is that anyone armed with the same login credentials can also access the same information. 

As was widely reported, the hackers apparently gained access to Sony’s computer systems by obtaining the login credentials of a high-level systems administrator.  Once the credentials were in the hands of the hackers, they were granted “keys to the entire building,” according to a U.S. official.

In this particular case, Terabytes of information obtained (and worse, deleted completely from company servers) is being used to wreak havoc on Sony’s movie business interests. 

In the case of the Target breach in late 2013 that exposed approximately 40 million debit and credit card accounts, login credentials were also the culprit.  In this case it was believed that login information stolen from a third party HVAC vendor was the source of the initial intrusion.

For Target, the losses are estimated at nearly half a billion dollars  This includes reimbursement associated with banks recovering the costs of reissuing millions of cards and customer service costs, including legal fees and credit monitoring for tens of millions of customers impacted by the breach.

Searching for the Ideal Solution

To combat this problem, IT personnel have turned to a variety of techniques to improve the security of logins including adding security questions and in some cases a secondary password.

However, these options are simply an extension of the same concept: possessing specific information that others can still acquire.

Another attempt currently in use involves throwing hardware at the problem. 

The logic is straightforward: provide each user with a physical device such as a flash drive or a token that provides random authentication codes, credit cards, or personal ID in various forms, including a smartphone.  If someone has the item, they arelegit.

Unfortunately, this is just another form of “possessing” something – in this case a piece of hardware instead of a piece of information.

Furthermore, the reason added hardware solutions are non-starters is that they dramatically increase the cost of implementation, not to mention the logistics of upkeep, and because these items can be lost or stolen still does not guarantee authentication of the user.

The answer, then, boils down to the only way to truly identify a person: biometrics. 

Biometrics is defined as something physically or behaviorally unique to an individual.  Physical examples include fingerprints, iris scans, facial recognition, and even vein scanning.

While these deliver near-absolute verification, this type of identification again requires sophisticated, costly hardware.  This is a significant barrier to implementation for reasons already stated above.

Fortunately, there is a surprisingly effective form of biometric verification in the behavioral category based on handwriting that requires no additional hardware beyond a typical computer arrangement or smartphone device.

It turns out that each person has a unique, measurable way of “drawing” letters and numbers that is extremely difficult to duplicate by others.  This includes attributes such as length, height, width, speed, direction, angle and number of strokes. 

Passcodes can be entered at login using a finger or stylus for touch screens and smartphones, or using a computer mouse or laptop touchpad.

Once a simple set-up process is completed, sophisticated software algorithms compare a user’s current login attempt against the initial patterns collected and subsequent logins to confirm a match.  Using this technique, accuracy rates as high as 99.97 percent are possible.

A number of companies are already releasing this type of technology. For example, a “software only” system utilizes audit trails based on the stored information to uncover suspicious activity by pinpointing the time, location, (including IP addresses) and history unauthorized users can be determined.  

To set up a new user on any device, the individual simply logs on to the network, draws and creates a unique four alphanumeric character or symbol passcode.  Upon subsequent logins, the biometric patterns of the created passcode are analyzed. Only the registered user is confirmed and is able to freely access their account.  Imposters have no idea “how” the passcode was created, so are stopped at the login step.

Corporate Implementation

A major corporate concern about implementing any additional layer of security is over potential consumer inconvenience.   

Many retailers and e-tailers have not implemented higher security measures because they don’t want their customers to spend additional time going through extra security. Extra time, they believe, may mean loss of clients and sales.

This is why the ease of user interface is a critical component of online authentication.  If the added security has too many steps or is too cumbersome it is doomed to fail.

To be sure, there are costs involved in implementing additional security solutions – even those that require no additional hardware.  However, corporations are well aware that the collateral damage of a major data breach is much, much higher in both cost and potential loss of consumer confidence. 

The problem then, is not whether or not they will invest in additional security, but in simply identifying solutions that meet all the requirements.

KEYWORDS: biometric access management biometric security data breach handwriting analysis password security security credentials

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Elliott is a Torrance, Calif.-based technical writer. He has researched and written about industrial technologies and issues for the past 15 years. To conduct a “test drive” of this technology, visit www.BioSig-ID.com. For more information, contact Biometric Signature ID at 708 Valley Ridge Cr., Suite 8; Lewisville, TX 75057; (877)700-1611 ext 1.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Generic Image for Cyber Security

    One in Five Data Breaches are the Result of Cyberespionage

    See More
  • hospital lobby

    Malicious attacks are #1 cause of healthcare data breaches

    See More
  • cyber threat

    97% of IT Leaders Say Insider Data Breaches are a Major Concern

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!