<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=905697862838810&amp;ev=PageView&amp;noscript=1">


Your one-stop resource for everything related to your financial well-being. 


The Nightmare of You: Why Authenticators Matter

authenticators-700Each day you probably use authenticators to prove your identity and establish trust. Whether it's accessing your cell phone, your bank accounts, or your employer's network, authentication is a part of our daily life. Without authenticators, establishing trust would make business transactions very difficult, and without secure authentication, an imposter could severely damage a business and your digital persona. Proving identity is increasingly important as we use global online services and surround ourselves with the internet.

The Trust Problem

Businesses have a trust problem because you could be their nightmare if you are impersonated. Authenticators help establish that we are who we claim to be and that we control one or more valid means to authenticate. By using strong authenticators, we are able to prove our identity and establish a reasonable level of trust. This trust is essential to your digital identity. Authenticators are grouped into three categories:

1. Something you know is a secret authenticator that only the authorized user should know and remember. 

Examples include passwords, personal identification numbers (PINs), passcodes, and passphrases. Since only the authorized user knows the secret, the user is granted access when they present the correct secret. For example, an application will compare the password you enter to the one it has in storage; if they match, you are granted access. Something you have is an authenticator that the authorized user possesses. Examples include a magnetic strip card, token, proximity card, or smartcard. This factor assumes that the authorized user physically controls the authenticator. For example, an employee must swipe their proximity card on a door reader to enter a facility. 

2. Something you are is an authenticator based on a human behavioral or physiological factor.

Examples include fingerprints, retinal scans, facial features, voice prints, and keystrokes. This factor relies on measurable characteristics of the user that are difficult to spoof. For example, a mobile phone may use a fingerprint for authentication.

Double Down

Many services are able to support multiple authenticators. Multifactor authentication (aka, two-factor authentication) requires successful authentication with two independent factors before you're granted access. For example, withdrawing money from an ATM requires physical possession of a card (something you have) and a PIN (something you know). Also, accessing a business network remotely may require an employee to enter a password and then a code sent to their mobile phone.

Risky Business

“I want you!” should be the mantra of hackers—a malicious actor who desires to compromise or steal your authenticator, to act on your behalf. Among many tactics, hackers may exploit:

Authenticator Reuse

Reusing a stolen authenticator may allow an attacker to compromise multiple devices or services. For example, avoid using the same PIN for your bank card and your phone. Similarly, using the same password to access your personal email and bank services can be unsafe. Do not reuse authenticators that protect access to high risk services.

Weak Authenticators

The use of weak authenticators unnecessarily increases your risk. Choose strong passwords and use multiple factors. While inconvenient, enabling multifactor authentication increases the burden for the attacker. Avoid using services or devices that do not support or require strong authentication. Choose authenticators wisely, based on your risk tolerance. 

Social Engineering

Hackers will try to trick you into revealing your authenticators. For example, attackers may use phishing to deploy malware on a device to steal credentials; set up fake websites with “password checkers” to steal your password; monitor public Wi-Fi to steal unprotected authenticators; or call you to ask for your authenticator. Protect yourself and do not share your authenticators with anyone.

Gateway Access

An attacker may compromise a device and then exploit the services connected to the device. For example, a lost mobile phone may allow access to automatically authenticated email or bank services. With access to the device, an attacker may request password resets through email or text. Protect your mobile device with a strong passcode and require authentication to all critical services linked to the device.

Authenticators help verify your identity and are designed to protect you. While we take many of them for granted, you should select reliable authenticators and employ them thoughtfully. Using one or more strong authentication factors helps lower the risk of someone impersonating you. If you fail to protect and prove your identity, malicious actors are eager to become the nightmare of you. 


Leave a comment below!