ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Practical Biometric Passwords Infiltrate the US Military

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

As reported by Sky News, the deal, which is worth multiple millions of dollars, is to be carried out by researchers at West Point. The concept is slightly different from previously proposed biometric technologies, focusing primarily on behavioral traits rather than physical traits. This can involve variables like how you move your mouse, or how you unlock your smartphone. These are called cognitive fingerprints, which are described as such:

Just as when you touch something with your finger you leave behind a fingerprint, when you interact with technology you do so in a pattern based on how your mind processes information, leaving behind a “cognitive fingerprint”

Another example used is stylometrics, which analyzes the structure and text of a writer to determine whether their writing is the real deal or copied from somewhere else. This is similar to the way that academic institutions identify authorship. The project, which is already in its fourth phase, has been primarily headed by West Point up until now. It’s expected to make landfall to the general public for uses such as online banking, shopping, or wireless device login credentials.

Whether or not something like this is a good thing is yet to be determined. Some are concerned that it will allow for more in-depth monitoring of personal habits. There has already been quite a bit of controversy over the NSA’s monitoring of the general public for some time, and some folks are worried that this type of authentication may lead to breaches in user privacy. Only time can tell if these measures will be effective at keeping user credentials and activity safe from prying eyes.

We don’t know how effective biometrics will be for password security, but we do know how to keep threats out of your business’s network. With ClearView IT’s Unified Threat Management device at your disposal, you’ll equip your business with a firewall, antivirus, content filtering, and spam blocking in one comprehensive enterprise-level solution. This gives you the power to avoid malicious entities while destroying those that do manage to get into your system. Give us a call at 866-326-7214 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Apps Windows 10 Managed Service IT Support Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Remote Work Internet of Things Operating System Government Saving Money Networking Gadgets Windows Workplace Strategy Artificial Intelligence Managed IT services Bandwidth Encryption Blockchain Mobile Device Management App Virtualization Business Technology Spam Information Remote Server WiFi Budget Gmail History Office Apple Two-factor Authentication Office 365 Information Technology Employee/Employer Relationship Cybercrime Wi-Fi BDR Big Data Conferencing Health Analytics Access Control Data Security Patch Management Voice over Internet Protocol Compliance Remote Monitoring Help Desk Hacking Employer-Employee Relationship Cost Management IT Management Training Remote Computing Hacker Vendor Document Management Save Money Augmented Reality Mobile Office Word Project Management IBM Managed Services BYOD Website Computing Search... Data loss Best Practice Vendor Management Hard Drive Retail Alert Legal Hiring/Firing Outlook Applications Money Password Data storage Customer Service Vulnerabilities Unified Threat Management Firewall Social Engineering Healthcare Cryptocurrency Paperless Office Black Market iPhone Remote Workers Antivirus Education Cortana Maintenance Cleaning Mobile Computing Windows 7 Content Filtering Robot Free Resource Marketing Router Running Cable How To Websites The Internet of Things Mobility Storage Meetings YouTube Google Maps Twitter Scam Windows 11 Laptop Law Enforcement End of Support Data Breach Printer User VPN Update Sports Social Chrome SaaS DDoS Travel Monitoring Virtual Reality Office Tips Private Cloud Memory PowerPoint Disaster Saving Time Administration Presentation Managed Services Provider Physical Security Computers Bitcoin Lithium-ion battery Specifications Politics IT Consultant Virtual Private Network Machine Learning Telephone Settings Start Menu Customer Relationship Management Current Events Processors Solid State Drive Downloads Computer Care Co-Managed IT Excel Solutions Entertainment Vulnerability Drones Integration Images 101 Chromebook Software as a Service Data Protection Display Automobile Virtual Assistant Wireless Technology How To eWaste Employees Avoiding Downtime Microchip Flexibility HIPAA Downtime Holidays Safety Processor Tech Terms Cooperation Hack Identity Theft Video Conferencing Virtual Desktop Notifications Managed IT Digital Unified Communications Experience Virtual Machines Computer Repair Google Docs Bluetooth Multi-factor Authentication Taxes Professional Services Distributed Denial of Service Service Level Agreement Internet Service Provider Computing Infrastructure Azure Business Communications Audit Management Regulations Compliance Point of Sale Spyware Device security Managed IT Service File Sharing Microsoft Excel Botnet Wireless Headphones Memes Tech Human Resources Rental Service Redundancy Electronic Payment Going Green Net Neutrality Shortcuts Micrsooft Business Cards Competition Error Financial Data Flash Cache Recovery IT Business Growth Workers Bookmark Risk Management Telephone Systems Unified Threat Management Term Google Apps Download Be Proactive Phone System Piracy LiFi Entrepreneur Documents Application Printing Telework HTML CCTV Nanotechnology Communitications Google Wallet Microsoft 365 Business Intelligence Browsers Smartwatch Banking Touchscreen Google Play Messenger Emergency Upload Procurement Workplace Strategies Deep Learning Software License Computer Malfunction Securty Social Network FinTech Vendor Mangement Screen Reader IT Assessment Hosted Solution Samsung Computer Accessories Domains Data Analysis CES Business Metrics Security Cameras Books Trends Supply Chain Management Uninterrupted Power Supply Mobile Technology Value Webcam Customer Resource management Organization Language Business Mangement Devices Cyber security Society Smart Devices Tablets Tip of the week Fileless Malware Reading Gamification Remote Working Smart Technology Monitors Company Culture Visible Light Communication Public Speaking Google Calendar Telephone System AI Regulations Trend Micro Windows 8 Supercomputer Backup and Disaster Recovery Electronic Health Records Transportation Streaming Media Directions Digital Security Cameras Virus Keyboard Relocation Content Displays Desktop Wasting Time Advertising Motion Sickness Modem Hard Drives Comparison Electronic Medical Records Work/Life Balance Google Drive Troubleshooting Accountants eCommerce Tech Support Database Surveillance intranet Videos Shortcut Knowledge Supply Chain Corporate Profile Managing Costs Wireless SSID Heating/Cooling In Internet of Things Television Environment Health IT Telephony Equifax Employer Employee Relationship Tactics Development Network Congestion Cabling Hard Drive Disposal Employer/Employee Relationships Windows XP Social Networking Media Hacks Reliable Computing Username Workplace Writing Tablet Virtual Machine G Suite Freedom of Information Mouse Reviews VoIP Business Owner Startup Optimization Tracking Addiction email scam Teamwork Navigation 2FA Scalability Data Storage Scams Mobile Security Hypervisor Web Server News Medical IT Administrator SharePoint User Tip Shopping Text Messaging Legislation Proactive IT Digital Payment Network Management Worker SQL Server Evernote Paperless Bring Your Own Device PCI DSS Cables Access Licensing Staffing Fake News IP Address Proxy Server Gig Economy Time Management Inbound Marketing Emails Humor Music Public Cloud

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?