Greetings!
Last month, we we covered password security and what you need to know about it.
This month, we go beyond passwords and examine the latest technology to solve some of the problems associated with passwords. This stuff is evolving fast and merits some attention.
Next month, get ready for an overview of the improved Google Calendar as well as Google Backup and Sync (for consumers) and Google Filestream (for enterprises).
Find more on Blog at GrundigIT.com
As Always, Happy Computing!
— Tom Grundig
Beyond Passwords
Covering:
- Two-factor authentication
- Single Sign-on (SSO)
- Thumbprint identification
- Facial Recognition
- Voice Recognition
- iPhone 8 security features
- Samsung Galaxy S8 Security Features
Two-factor authentication
2-factor authentication is an extra layer of security. Usually, it requires someone to enter not only a username and password, but also a piece of information that only the user knows or has access to. Now, companies such as Google, Apple, Microsoft, Facebook and Amazon either require or allow people or companies to enable 2-factor authentication.
Some of Grundig IT’s clients use 2-factor authentication for GSuite logins. When they login to any GSuite application, a text message with a 6-digit code is sent to their phone and they have to input this number before they can complete the login. For more, see this article on CNET or this one at Secure Envoy.
Single Sign-on (SSO)
Single Sign-on (SSO) services enable people to login to a single web console in order to gain access to services their employers would like them to use, usually websites that require logins. Companies are employing SSO to avoid having to give passwords for individual applications to their employees. The usernames and passwords for sites are coded into the administrative console of the SSO service and never revealed to individual users. General information about SSO can be found here.
Here a couple of Single Sign-on providers that companies can consider . . .
Allows and provides Single Sign-on to easily control access to a large variety of cloud applications which require a web login. This service is geared towards CPA and accounting firms.
Avatier develops and provides identity management software. They offer several SSO options, including Active Directory SSO Authentication, Auto Detect and Enforce, which forces users to sign on through the Avatier SSO portal when they attempt to access cloud applications. Enterprise Password Synchronization synchronizes SSO passwords when directory passwords change.
Thumbprint
Thumbprints allows people to unlock a device (generally a smartphone) using a thumbprint. Due to the uniqueness of biometric methods like fingerprints, this form of authentication is a convenient for users. This technology was introduced in smartphones as early as 2011 and later incorporated into the iPhone 5S in 2013.
Facial Recognition
Facial recognition enables applications or devices to identify a person by recognizing their face. While not much more secure than a fingerprint scanner, new biometric methods like facial recognition are becoming more popular. The concern: Earlier versions of facial recognition technology could be fooled by an image of the user. But, as with fingers, heads are hard to remove without someone noticing. Check out the following for more information . . .
Voice Recognition
Voice recognition analyses the way people say words. Users no longer have to remember passwords. Recently, HSBC implemented a voice recognition system. It asks the user to say a few words and compares them to the voice ID. This approach is not foolproof. A BBC reporter set up an HSBC account. He signed up for the Voice ID authentication service. The reporter’s twin brother accessed the account via telephone. He was able to imitate his brother’s voice to gain access. More can be found at . . .
Which devices offer or will offer some of these features?
iPhone 8
– Facial recognition (Apple’s newest feature), powered by a 3D sensor.
– TouchID (which may be supplanted by facial recognition) is Apple’s version of fingerprint identification.
– Voice recognition to control the device, but not to unlock it.
Galaxy S8 (from Samsung)
– Iris scanner
– Thumbprint
– Facial recognition (not as secure as Apple’s). It sometimes can be unlocked with a photo.
– Voice recognition, but not to unlock the device.
iPhone vs. Droid
Both iPhone and Android offer more than just locking the device with a password. They offer fast speeds when unlocking with face recognition. The Galaxy S8 offers iris scanner while iPhone 8 does not. The Galaxy S8’s face recognition feature is flawed because it has sometimes been unlocked with a picture of the owner.
Which would you most want to use?
Most likely iPhone 8. It’s facial recognition feature is more reliable and secure with 3D scanning.
Conclusion
There are many new features and technologies that can help you secure your devices. A bit of research will help you select the right one. Let us know if you have any questions or need help selecting the right technology.
As Always, Happy Computing!
— Grundig IT – 925.528.9081 tom@grundigit.com