ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

As reported by Sky News, the deal, which is worth multiple millions of dollars, is to be carried out by researchers at West Point. The concept is slightly different from previously proposed biometric technologies, focusing primarily on behavioral traits rather than physical traits. This can involve variables like how you move your mouse, or how you unlock your smartphone. These are called cognitive fingerprints, which are described as such:

Just as when you touch something with your finger you leave behind a fingerprint, when you interact with technology you do so in a pattern based on how your mind processes information, leaving behind a “cognitive fingerprint”

Another example used is stylometrics, which analyzes the structure and text of a writer to determine whether their writing is the real deal or copied from somewhere else. This is similar to the way that academic institutions identify authorship. The project, which is already in its fourth phase, has been primarily headed by West Point up until now. It’s expected to make landfall to the general public for uses such as online banking, shopping, or wireless device login credentials.

Whether or not something like this is a good thing is yet to be determined. Some are concerned that it will allow for more in-depth monitoring of personal habits. There has already been quite a bit of controversy over the NSA’s monitoring of the general public for some time, and some folks are worried that this type of authentication may lead to breaches in user privacy. Only time can tell if these measures will be effective at keeping user credentials and activity safe from prying eyes.

We don’t know how effective biometrics will be for password security, but we do know how to keep threats out of your business’s network. With ClearView IT’s Unified Threat Management device at your disposal, you’ll equip your business with a firewall, antivirus, content filtering, and spam blocking in one comprehensive enterprise-level solution. This gives you the power to avoid malicious entities while destroying those that do manage to get into your system. Give us a call at 866-326-7214 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Disaster Recovery Passwords Holiday IT Support Browser Managed Service Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Saving Money Operating System Government Managed IT services Workplace Strategy Networking Gadgets Artificial Intelligence Windows App Business Technology Blockchain Virtualization Spam Remote Server Information Mobile Device Management WiFi Bandwidth Encryption History Office Two-factor Authentication Office 365 Budget Employee/Employer Relationship Apple Information Technology Gmail Health Wi-Fi Conferencing Analytics Access Control Data Security Cybercrime BDR Big Data Help Desk Employer-Employee Relationship Hacking IT Management Save Money Training Remote Computing Hacker Patch Management Vendor Cost Management Compliance Voice over Internet Protocol Remote Monitoring Document Management Best Practice Data storage Retail Data loss Alert Hiring/Firing Outlook Money BYOD Password Computing Customer Service Unified Threat Management Firewall Applications Vendor Management Hard Drive Augmented Reality Vulnerabilities Word Project Management Mobile Office IBM Legal Website Managed Services Search... How To The Internet of Things Storage YouTube Google Maps Scam Travel Virtual Reality Social Engineering Laptop Cryptocurrency Black Market VPN User Cleaning Update Robot Data Breach Sports Windows 11 Social Chrome SaaS DDoS Paperless Office Antivirus Maintenance iPhone Twitter Education Cortana Mobile Computing Monitoring Remote Workers Content Filtering Healthcare Law Enforcement Windows 7 Marketing End of Support Free Resource Printer Websites Running Cable Router Meetings Mobility Software as a Service Notifications Telephone Unified Communications Data Protection Solutions Google Docs Bluetooth Images 101 Integration Distributed Denial of Service Display Excel Office Tips Wireless Technology Memory eWaste Private Cloud Employees HIPAA Downtime Tech Terms Avoiding Downtime Virtual Assistant Safety Managed IT Holidays Politics Settings Digital Machine Learning Virtual Desktop Cooperation Experience Video Conferencing Taxes Solid State Drive Processor Virtual Machines Computer Repair Chromebook Drones Professional Services PowerPoint Disaster Administration Physical Security Automobile Multi-factor Authentication Presentation Specifications Lithium-ion battery How To Managed Services Provider IT Consultant Microchip Start Menu Flexibility Saving Time Downloads Virtual Private Network Computer Care Customer Relationship Management Processors Co-Managed IT Vulnerability Hack Current Events Entertainment Identity Theft Computers Bitcoin FinTech Piracy Tablets Term Download Shortcuts CES HTML IT Assessment Scalability Supercomputer Administrator Value Text Messaging Browsers Proactive IT Google Calendar Nanotechnology Supply Chain Management Virus Organization Software License Cyber security Bring Your Own Device Google Play Upload Be Proactive Social Network Public Speaking Smart Devices Motion Sickness Streaming Media Data Analysis Music Comparison Screen Reader Google Drive Remote Working Trends Keyboard AI Mobile Technology Trend Micro Security Cameras Troubleshooting Workplace Strategies Customer Resource management Hard Drives Knowledge Digital Security Cameras Devices Corporate Profile Electronic Health Records Transportation Tip of the week Employer Employee Relationship Botnet Wasting Time Fileless Malware Television intranet Telephony Gamification Shortcut Company Culture Cabling eCommerce Rental Service Modem Micrsooft Wireless Flash Telephone System Heating/Cooling Videos Regulations Environment Tablet Surveillance G Suite Tracking Managing Costs Telephone Systems Windows XP Directions Business Growth Mouse Backup and Disaster Recovery Social Networking VoIP Content Desktop SSID Employer/Employee Relationships Business Owner Smart Technology Electronic Medical Records Media Accountants Development Web Server Digital Payment Virtual Machine Banking Google Wallet SharePoint Database Reviews Worker Optimization Messenger Deep Learning Teamwork Health IT 2FA Equifax Access Data Storage Hard Drive Disposal Public Cloud Hypervisor Business Metrics Hosted Solution Tactics Time Management Username Shopping Books Medical IT Staffing SQL Server Inbound Marketing Language Supply Chain Society IP Address Audit Paperless Startup Spyware Freedom of Information PCI DSS email scam File Sharing Licensing Navigation Addiction Visible Light Communication Redundancy Gig Economy Mobile Security Humor Reading Monitors Azure Workplace User Tip Windows 8 Business Communications Legislation Cache Internet Service Provider News Regulations Compliance Workers Managed IT Service Electronic Payment Evernote Network Management Unified Threat Management Advertising Competition Memes Relocation Displays Recovery Work/Life Balance Scams Proxy Server Tech Support Printing Human Resources Emails Net Neutrality Fake News CCTV Financial Data Computing Infrastructure LiFi Phone System Service Level Agreement Entrepreneur Touchscreen Management Application Emergency Risk Management Device security IT Computer Malfunction Documents Cables Google Apps Wireless Headphones Business Intelligence Vendor Mangement Microsoft Excel In Internet of Things Telework Business Cards Samsung Hacks Tech Network Congestion Going Green Securty Error Smartwatch Uninterrupted Power Supply Communitications Webcam Reliable Computing Microsoft 365 Writing Point of Sale Computer Accessories Bookmark Domains Business Mangement Procurement

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?