Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical SecurityIdentity Management

Authenticating Identities to Mitigate Security Breaches and Improve Business Efficiency

By Amy McKeown
ID Management security default
December 8, 2015

In the era of big data, authentication and security have become evermore important pieces of the puzzle. Companies authenticate identity for a variety of reasons, such as protecting against a security breach, on-site access control and proper encryption of data. Used to make sure people are who they say they are, we see authentication employed most often for employee verification, protecting personal, financial and medical information, and in the sale of controlled substances, like cigarettes or alcohol. In addition, banks and healthcare facilities may soon require individuals to have IDs authenticated or biometric identifiers may be required to gain access to personal accounts. Not only does this help speed up transaction time and check-in processes, it also adds a layer of security to sensitive, personal information.

Addressing Internal and External Threats

As the Internet becomes more accessible, customers and employees are retrieving private information from more devices on more networks and there’s a growing expectation that information can be accessed remotely. As such, it is imperative that security and authentication procedures address both internal and external threats to identities and data.

Using unique identifiers like government-issued IDs or personal biometric identifiers will help to confirm the identity of both your customers and employees each time they attempt to access privileged information. Including these types of authentication into procedures will allow for thorough and trustworthy background screening; it will also facilitate the implementation of advanced access control procedures. A recent Forrester studyfound that, of the data breaches which occurred in the past 12 months, 46 percent originated from within an organization. That means that authenticating, just as much as controlling, employee access is critical to ensuring privacy and security.

Likewise, employing external access authentication measures to network security and customer accounts should not be overlooked. For both physical and cyber security, multi-step authentication is becoming a best practice and while it is not yet universally adopted, consumers are becoming more aware of the practices due to growing educational efforts. After all, the missing piece to customer acceptance is typically education.

“Educating consumers on best practices has shown to have a very positive effect on reducing fraud levels,” says Jonathan Hancock, Director, Fraud Product Strategy & Services at TSYS. “When customers fully understand that security measures are being used to help avoid the data breaches they frequently read about, they are more likely to participate in helping to protect themselves.” One of the most important, and often overlooked, components to a robust security plan is communicating with your customers. Companies that have experienced data breaches, like JP Morgan and Community Health Services, Inc., have increased their external communication efforts with customers to advise stronger passwords, and changing passwords more frequently. If that communication had been utilized before the breach, perhaps it would never have occurred.

Passwords

Most people tend to use less than 10 passwords in their lifetime. Once a fraudster captures one password, it isn’t difficult for them to crack the slight variations of that same password. Additionally, it is important to keep in mind the strength of your password. Based on planned password hacks, Ars Technicagives the following advice, “Take pains to make sure passwords are a minimum of 11 characters, contain upper- and lower-case letters, numbers, and aren't part of a pattern.” Once a password is strong, combining it with a biometric layer of authentication increases security, and ultimately peace of mind.

Technology as a Deterrent
Invest in and incorporate new technology into security processes on a frequent basis, and don’t be afraid to talk about it. When companies are known to have meticulous and advanced security processes, breaches are less likely to even be attempted. There are a variety of companies employing this logic, of which, Disney is one.“At Disney World, a mix of RFID-enabled wristbands and biometric fingerprint scanners have been used to ensure that only the person whose name is on the ticket enters the park. This helps to prevent visitors from lending, sharing or even selling their ticket to others.”In the end, Disney’s use of multi-authentication effectively ties the actual person to the purchased ticket, and does so without using anything as flashy as biometrics. Passwords, text or phone verification, government-issued IDs, and even coded RFID tags are all second-layer or even third-layer authentication steps that can be employed.

As security breaches happen more frequently and to more companies, the trend to invest in security measures will increase, ultimately resulting in protection against fraud as well as better user experiences. Even if criminals don’t obtain something as scary as a Social Security number, their ability to access information about gym memberships, birthdates or e-mail addresses can sometimes be just as detrimental. Target, JP Morgan and eBay all experienced unparalled security breaches because of password issues. These breaches took a toll on the company that was attacked, but other companies as well. Consumers with compromised accounts had to shut down their credit cards, in turn impacting other businesses like fitness clubs or streaming television providers. “The closing down of countless credit card accounts has not only caused a severe negative impact on reliable monthly dues but has also caused a huge disruption because of greater cancellations of memberships.”

By instituting a method that relies on a unique personal characteristic, the likelihood of a security breach can decrease. Remember, strengthening security does not need to jeopardize accessibility. Implementing new, modern approaches to authentication creates a solid foundation for an effective and dynamic security solution. 

KEYWORDS: data breach Identity Authentication password management theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amy McKeown, 3M, U.S. Public Security Segment, Marketing

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video monitors

    How Retailers Can Leverage Their Security Infrastructure to Improve Operational Efficiency

    See More
  • SEC0119-prod-slide4_900px

    Analyzes Incidents to Improve Efficiency and Compliance

    See More
  • Retail technology to reduce shrink, and improve security

    Implementing next-gen retail technology to improve security & mitigate fraud

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing