This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification
Access ManagementIdentity ManagementSecurity Newswire

Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification

Security newswire default
April 11, 2018
KEYWORDS identity management / verification / voice recognition
Reprints
No Comments

A new Pindrop survey has found the vast majority (81%) believe there are benefits to using voice recognition as a form of personal verification.

Not only do 81% find benefits, said the survey, but nearly half of Americans (48%) said they would be likely to use voice recognition as a form of personal verification.

The study also assessed consumer engagement with financial institutions, retailers, healthcare providers and other major omnichannel organizations. Findings indicate that roughly half of Americans contacted financial service companies (49%), healthcare companies (59%), insurance companies (54%), and telco companies (60%), via phone with a customer service inquiry in the last 12 months. About one in ten Americans contacted healthcare companies (15%), insurance companies (9%) and financial service companies (11%) via phone more than five times per year.

Consumer Frustration

Consumers may be dissatisfied with current verification methods used to protect their personal information. More than one in four Americans who have accessed an account at a healthcare company (28%) or TV/telecom company (27%) by phone expressed frustration with their experience. Among those who have found it difficult to access their accounts* by phone, burdensome requirements to answer numerous identity verification questions is the cause of this difficulty for over one quarter of them (28%).  Additionally, nearly one in five (18%) have found it difficult because they forgot the answers to their security questions and were locked out of their accounts.

“We are ushering in a new era of passive voice authentication that will create opportunities for brands to interact with their customers,” said Scott Rose, SVP of Product, Pindrop. “As consumers go beyond their phones and increase interactions with voice activated devices, it is crucial not to confuse personalization with security and identification.”

Fear, Uncertainty, and Doubt Abound

One key finding in the study highlights that roughly four out of five Americans (81%) believe there are benefits to using voice recognition as a form of personal verification. However, concerns remain as 94% believe there are drawbacks to this process. The top reasons for concern include:

  • 61%: May not work well because of background noise (channel independence)
  • 60%: May not work accurately every time (low EER)
  • 48%: Voice can be cloned and used against them (voice spoofing)
  • 43%: May have difficulty recognizing accents
  • 39%: May not be secure
  • 36%: Requires you to speak loudly and clearly (channel independence)
  • 31%: Lack of info on how voice as personal verification works

“In January, Pindrop released the first-of-its-kind Deep Voice™ biometric engine that is able to recognize a consumer by their voice, even with short command-like utterances in a passive manner,” Rose said. “Pindrop®Labs first looked at the limitations of current voice biometrics and specifically designed a voice biometric engine, in a deep neural architecture, that  addresses the top consumer concerns such as channel independence, the emerging threat of voice synthesis and accuracy rates.”

The Frictionless Conversational Economy

In the emerging conversational economy, brands are reimagining voice activated consumer experiences. Enterprise level security and multi-factor authentication is the necessary next step for all industries creating new opportunities for frictionless customer experiences. As more channels become voice-activated, fraudsters will leverage emerging technologies such as voice synthesis to impersonate consumers. Today, voice fraud costs organizations in the U.S. $14 billion each year within call centers alone.

Subscribe to Security Magazine

Related Articles

Nearly Half of Americans Willing to Give Brands a Pass for a Data Breach

Half of All American Adults are in a Police Face Recognition Database

Study Finds Three in Ten Americans Would Use Their Cell Phone to Track Personal Health

Nearly Half of Business Owners Have Been Victims of Cyberattacks

Related Products

The Database Hacker's Handbook: Defending Database Servers

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

Related Events

Transforming Care and the Patient Experience: A Smart Hospitals Application of Remote Monitoring

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

Globe

Which Countries Have the Worst and Best Cybersecurity?

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

password1-900px.jpg

New Vulnerabilities Found in Top Password Managers

password1-900px.jpg

How Americans Leave their Personal Info Open to Thieves

20180226SEC_DataminrFeb_360x184customcontent

Events

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
March 7, 2019

Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.)

Security infrastructures are undergoing a digital transformation with growing adoption of intelligent access control, video surveillance and analytics as well as IoT devices and sensors – generating more data to than ever before. Harnessed properly with artificial intelligence and a risk-based model, this data can be exposed and leveraged to improve life safety, minimize risk and increase operational efficiency.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing