Blog

Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The US Military Plans to Bring Biometric Passwords to the Public

b2ap3_thumbnail_biometric_security_systems_400.jpgHumans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

Sky News reports that the deal struck by the US military is worth multiple millions of dollars, and is currently being carried out by the researchers at West Point. Other conceptual biometric technologies, like fingerprints or corneal-scanning have already been developed, but these types of biometrics are much different from the previously proposed ideas. Instead of concentrating on the physical characteristics of the users, this new method would examine the behavioral aspects of how a user uses their technology.

For instance, everyone moves their mouse differently, and uses a swiping pattern to unlock their smartphone. These are called cognitive fingerprints:

Just as when you touch something with your finger you leave behind a fingerprint, when you interact with technology you do so in a pattern based on how your mind processes information, leaving behind a “cognitive fingerprint.”

As Mashable puts it, “You pass authentication just by being you.”

One example highlighted was stylometrics, which analyzes the style and structure of a user’s writing. This can determine authorship in a similar manner to the way academic institutions identify plagiarism. The project to integrate certain biometrics such as these is already in its fourth phase, and is expected to soon be available to the general public for online shopping, banking, and more.

Is this something that should be developed? Some people aren’t so sure. Advocates of privacy feel that this new method may be used as a new tool for cyber espionage, or for in-depth monitoring of personal habits. This is mainly due to the controversy over the NSA’s controversial practices, but only time can tell whether these concerns are justified or not.

We might not know how effective these biometrics will be, but we know one sure-fire way to protect the integrity of your business’s network: Network Synergy’s Unified Threat Management solution. With this device, your business will have a firewall, antivirus, content filtering, and spam blocking solution to keep your network as secure as possible. Malicious entities have an arsenal of different tools they can use to bring down your business, but with this comprehensive enterprise-level solution protecting your network, you’ll have nothing to fear. Give us a call at (203) 261-2201 to learn more.

Will Microsoft’s New Office App Sway Dethrone Powe...
Tip of the Week: How to Respond to Internet Trol...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, 22 December 2024

Captcha Image

Contact us

Learn more about what Network Synergy can do for your business.

Network Synergy
126 Monroe Turnpike
Trumbull, Connecticut 06611

Network Synergy Corporation BBB Business Review

Best IT Managed Service Providers in Bridgeport aicpa logo net syn

News & Updates

Network Synergy is proud to announce the launch of our new website at www.netsynergy.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Copyright Network Synergy. All Rights Reserved.