Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical SecurityIdentity Management

Authenticating Identities to Mitigate Security Breaches and Improve Business Efficiency

By Amy McKeown
December 8, 2015

In the era of big data, authentication and security have become evermore important pieces of the puzzle. Companies authenticate identity for a variety of reasons, such as protecting against a security breach, on-site access control and proper encryption of data. Used to make sure people are who they say they are, we see authentication employed most often for employee verification, protecting personal, financial and medical information, and in the sale of controlled substances, like cigarettes or alcohol. In addition, banks and healthcare facilities may soon require individuals to have IDs authenticated or biometric identifiers may be required to gain access to personal accounts. Not only does this help speed up transaction time and check-in processes, it also adds a layer of security to sensitive, personal information.

Addressing Internal and External Threats

As the Internet becomes more accessible, customers and employees are retrieving private information from more devices on more networks and there’s a growing expectation that information can be accessed remotely. As such, it is imperative that security and authentication procedures address both internal and external threats to identities and data.

Using unique identifiers like government-issued IDs or personal biometric identifiers will help to confirm the identity of both your customers and employees each time they attempt to access privileged information. Including these types of authentication into procedures will allow for thorough and trustworthy background screening; it will also facilitate the implementation of advanced access control procedures. A recent Forrester studyfound that, of the data breaches which occurred in the past 12 months, 46 percent originated from within an organization. That means that authenticating, just as much as controlling, employee access is critical to ensuring privacy and security.

Likewise, employing external access authentication measures to network security and customer accounts should not be overlooked. For both physical and cyber security, multi-step authentication is becoming a best practice and while it is not yet universally adopted, consumers are becoming more aware of the practices due to growing educational efforts. After all, the missing piece to customer acceptance is typically education.

“Educating consumers on best practices has shown to have a very positive effect on reducing fraud levels,” says Jonathan Hancock, Director, Fraud Product Strategy & Services at TSYS. “When customers fully understand that security measures are being used to help avoid the data breaches they frequently read about, they are more likely to participate in helping to protect themselves.” One of the most important, and often overlooked, components to a robust security plan is communicating with your customers. Companies that have experienced data breaches, like JP Morgan and Community Health Services, Inc., have increased their external communication efforts with customers to advise stronger passwords, and changing passwords more frequently. If that communication had been utilized before the breach, perhaps it would never have occurred.

Passwords

Most people tend to use less than 10 passwords in their lifetime. Once a fraudster captures one password, it isn’t difficult for them to crack the slight variations of that same password. Additionally, it is important to keep in mind the strength of your password. Based on planned password hacks, Ars Technicagives the following advice, “Take pains to make sure passwords are a minimum of 11 characters, contain upper- and lower-case letters, numbers, and aren't part of a pattern.” Once a password is strong, combining it with a biometric layer of authentication increases security, and ultimately peace of mind.

Technology as a Deterrent
Invest in and incorporate new technology into security processes on a frequent basis, and don’t be afraid to talk about it. When companies are known to have meticulous and advanced security processes, breaches are less likely to even be attempted. There are a variety of companies employing this logic, of which, Disney is one.“At Disney World, a mix of RFID-enabled wristbands and biometric fingerprint scanners have been used to ensure that only the person whose name is on the ticket enters the park. This helps to prevent visitors from lending, sharing or even selling their ticket to others.”In the end, Disney’s use of multi-authentication effectively ties the actual person to the purchased ticket, and does so without using anything as flashy as biometrics. Passwords, text or phone verification, government-issued IDs, and even coded RFID tags are all second-layer or even third-layer authentication steps that can be employed.

As security breaches happen more frequently and to more companies, the trend to invest in security measures will increase, ultimately resulting in protection against fraud as well as better user experiences. Even if criminals don’t obtain something as scary as a Social Security number, their ability to access information about gym memberships, birthdates or e-mail addresses can sometimes be just as detrimental. Target, JP Morgan and eBay all experienced unparalled security breaches because of password issues. These breaches took a toll on the company that was attacked, but other companies as well. Consumers with compromised accounts had to shut down their credit cards, in turn impacting other businesses like fitness clubs or streaming television providers. “The closing down of countless credit card accounts has not only caused a severe negative impact on reliable monthly dues but has also caused a huge disruption because of greater cancellations of memberships.”

By instituting a method that relies on a unique personal characteristic, the likelihood of a security breach can decrease. Remember, strengthening security does not need to jeopardize accessibility. Implementing new, modern approaches to authentication creates a solid foundation for an effective and dynamic security solution. 

KEYWORDS: data breach Identity Authentication password management theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amy McKeown, 3M, U.S. Public Security Segment, Marketing

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video monitors

    How Retailers Can Leverage Their Security Infrastructure to Improve Operational Efficiency

    See More
  • SEC0119-prod-slide4_900px

    Analyzes Incidents to Improve Efficiency and Compliance

    See More
  • Retail technology to reduce shrink, and improve security

    Implementing next-gen retail technology to improve security & mitigate fraud

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • September 9, 2025

    Actionable Strategies to Mitigate Active Assailant Risk

    ON DEMAND: Active assailant incidents are surging — Are you ready? 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing