Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/24/2007
08:25 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Banks Lag in Strong Authentication

New study says majority of banks won't have multi-factor authentication until next year

Chances are, your bank probably didn't make the deadline: Only about half of U.S. banks got their multi-factor authentication (MFA) deployments off the ground by last year, according to a new study, and the rest won't be operational until late next year.

The banks are attempting to come into compliance with the Federal Financial Institutions Examination Council (FFIEC)'s regulations that require them to provide customers with multiple layers of authentication. Today, 50 percent have operational MFA for retail online banking and 40 percent have it for small business banking, but those numbers will jump to 90 percent by year's end, Celent's report says. About 60 percent have MFA for corporate banking today, and that figure will increase to 95 percent by the end of the year, according to the report.

"Banks are still scratching their heads that there are so many [MFA] options, and they've got to get something out the door," says Jacob Jegher, senior analyst with Celent, a research firm that works with financial institutions. "The regulators are telling [them] they've got to act on this, but they are worried about the affect on the user experience."

The banks must add telephone and mobile banking to their MFA project lists as well, he noted.

Although most banks will have their multi-factor authentication systems in place by the end of this year, that doesn't mean it will be a done deal, he says. Today's authentication schemes may not hold up to the next wave of threats, so banks need to regularly study their anti-fraud measures to make sure they are still effective, according to the Celent report.

Early on, financial institutions agonized over how they could distribute and then support hardware tokens for authenticating their consumer customers. Managing and provisioning hardware was unwieldy and pricey ($30 a token), so many went with software-based solutions that augment the old standby password. (See Putting Security in the Bank and Banks Launch Authentication Project .)

"Many of the security vendors thought that the FFIEC guidelines would cause tokens to fall from the sky like manna from heaven. It hasn't worked out that way, owing largely to the usual issues -- cost and usability," says Andrew Jacquith, senior analyst with the Yankee Group. Jaquith says hardware tokens are pricier, so software-based authentication, such as PassMark, has emerged as a more affordable and easily provisioned option.

"But these, too, aren't foolproof, and present a learning curve for consumers," Jaquith says.

Celent's Jegher says as soon as you deploy a multi-factor authentication system, however, the bad guys are already working on ways to circumvent it. "There will be attempts to work around it," he says. "And banks will possibly have to add additional security measures."

As always, end users are the weakest link. Jegher points to a recent multi-factor authentication study conducted by Harvard University and MIT to test whether users would look for their authenticating image and phrase before typing in their passwords. They were given their login screen, but without the visual cues that signal they are on their bank's site. It didn't go well for multi-factor, with 97 percent of users logging in, even though the additional authentication layer was missing.

Meanwhile, Celent says banks are way behind in deploying MFA for telephone and mobile banking, which also fall under the FFIEC regulations. Only 30 percent of banks will deploy MFA for telephone banking this year, according to Celent, as many struggle to balance technology with human intervention in the process. Voice authentication holds promise, but Celent doesn't expect it to take off any time soon.

As for mobile banking -- banking over your PDA -- Celent says SMS and WAP will be key to authenticating these transactions, as well as downloadable applications that would run on the PDAs.

Meanwhile, who's inside the bank may be the greater threat: Anywhere from 50 to 70 percent of bank fraud comes from bank employees and other insiders, according to Celent, which plans to tackle the insider threat at banks in an upcoming report.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Yankee Group Research Inc. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 6/4/2020
    Abandoned Apps May Pose Security Risk to Mobile Devices
    Robert Lemos, Contributing Writer,  5/29/2020
    Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: What? IT said I needed virus protection!
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-13817
    PUBLISHED: 2020-06-04
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attac...
    CVE-2020-13818
    PUBLISHED: 2020-06-04
    In Zoho ManageEngine OpManager before 125144, when <cachestart> is used, directory traversal validation can be bypassed.
    CVE-2020-6640
    PUBLISHED: 2020-06-04
    An improper neutralization of input vulnerability in the Admin Profile of FortiAnalyzer may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the Description Area.
    CVE-2020-9292
    PUBLISHED: 2020-06-04
    An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges via the AoWinAgt executable service path.
    CVE-2019-16150
    PUBLISHED: 2020-06-04
    Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded ...