The Rhythm of Security
March 1, 2011 No CommentsSTRENGTHENING LOGIN ACCESS WITH ADVANCED KEYSTROKE DYNAMICS SOFTWARE
By: Felix Racca, Founder and Chief Technology Officer of Authenware
It is difficult today for many to imagine living outside of a tri-screen household – television, computer, and cell phone. Certainly, these devices bring unprecedented access and efficiency to businesses, critical infrastructures, and military operations; however, in the process of advancing convenience, security is compromised.
In 2008, 285 million consumer records were breached, and the financial repercussions of compromised online data rose to nearly $1 trillion. Such augmented expenditures are a result of the expanding web of electronic networks which will entangle over 1 trillion devices at the conclusion of 2009.
In response to the cybersecurity pandemic, CIO’s and IT executives have moved to construct more complicated firewalls and password rules, but have thus far failed to widely adopt a stronger authentication infrastructure. As a result, Internet crimes dramatically rise, and their effects are only perpetuated by increasingly sophisticated cybercriminals who execute intricate attacks.
In the search for a stronger online archetype, network access points must move beyond identifying a third-party factor (i.e., a password, key fob, etc.) and toward authenticating the administrator of such devices.