Your IT Support Experts - Homepage

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

(703) 359-9211

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

Macro Systems Blog

Macro Systems has been serving the Metro Washington, DC area since 1997, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Examining the Variables Associated with Promise Voice Authentication

Examining the Variables Associated with Promise Voice Authentication

Authentication has been a significant talking point for the past few years, especially as the value of data has only increased and security has correspondingly increased in importance. As a result, more secure and reliable means of identity verification have also become more important. Now, voice authentication is being considered as such a means.

Below we examine the numerous variables associated with voice authentication to see how much promise it actually shows.

How Does Voice Authentication Work?

It may help to specify how authentication in general works, just so we can get a full appreciation of how voice authentication would function.

In any variety of authentication measures, the user offers some type of proof of identity. If that proof matches the reference that the security system is comparing it to, the user is given access. In terms of voice authentication, the user’s voiceprint of a specific phrase would be compared to the stored copy of what that user’s voiceprint should resemble.

Thus, if your passphrase was “The clouds in Georgetown hover over the sleeping dog,” the system would check for the correct phrase, but also check that the tones and inflections present in the user’s voice matched the patterns in that user’s voiceprint. As a result, voice authentication is typically classified under the “something you are” subset of multi-factor authentication along with retinal scans, facial recognition, or palm scans.

How Secure is Voice Authentication?

Like any other authentication measure, there are already countless stories of voice recognition being breached, meaning that more work is needed to keep your solutions secured. Hackers have already been able to fool voice authentication using recorded snippets, and have hidden malicious commands in white noise to gain control over voice-activated devices.

However, it is critical that we also address that any form of identity authentication is inherently less secure when used exclusively, rather than as part of a multi-factor authentication strategy. Furthermore, voice authentication is now being created with two fraud-fighting technologies built-in. The first, liveness detection, works to differentiate between a live voice and a recorded one. The second, continuous authentication, does what its name suggests and verifies the user throughout the time they are active. That way, an attacker that just switches back to themselves after using a recorded voice to log in would be caught regardless.

Best Practices Concerning Voice Authentication

We’ve referenced a few already, but here are a few essential functions that any voice-based authentication system should involve:

  • Multi-Factor Authentication: We can’t encourage the use of MFA enough. The more proof that a user has to provide to prove their identity, the less likely it is that an unauthorized individual will have what they need to access your resources. Pairing a PIN or password/passphrase with a secondary proof, like voice authentication, makes it much harder for this kind of access to be secured. This primary form of authentication should need to be reconfirmed regularly.

  • Secure Storage: On your end, you need to keep your saved records of all authentication data extremely secure… including the biometric data. Otherwise, MFA could potentially be fooled and the whole system would topple.

  • Obtain Consent: You also need proof that your users have agreed to use biometric data as an authentication measure, for privacy and legal reasons alike.

So, would you consider implementing voice authentication as an option in your company’s protections—specifically as part of a multi-factor authentication requirement? Are you concerned about the protections you currently have in place? Give Macro Systems a call, we’ll help ensure that your business is properly secured. Call 703-359-9211 today.

How to Optimize the Privacy Settings in Your Brows...
Examining the 2 Types of VPN
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, November 21, 2024

Captcha Image

Customer Login


Contact Us

Learn more about what Macro Systems can do for your business.

(703) 359-9211

Macro Systems
3867 Plaza Drive
Fairfax, Virginia 22030