Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/24/2007
08:25 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Banks Lag in Strong Authentication

New study says majority of banks won't have multi-factor authentication until next year

Chances are, your bank probably didn't make the deadline: Only about half of U.S. banks got their multi-factor authentication (MFA) deployments off the ground by last year, according to a new study, and the rest won't be operational until late next year.

The banks are attempting to come into compliance with the Federal Financial Institutions Examination Council (FFIEC)'s regulations that require them to provide customers with multiple layers of authentication. Today, 50 percent have operational MFA for retail online banking and 40 percent have it for small business banking, but those numbers will jump to 90 percent by year's end, Celent's report says. About 60 percent have MFA for corporate banking today, and that figure will increase to 95 percent by the end of the year, according to the report.

"Banks are still scratching their heads that there are so many [MFA] options, and they've got to get something out the door," says Jacob Jegher, senior analyst with Celent, a research firm that works with financial institutions. "The regulators are telling [them] they've got to act on this, but they are worried about the affect on the user experience."

The banks must add telephone and mobile banking to their MFA project lists as well, he noted.

Although most banks will have their multi-factor authentication systems in place by the end of this year, that doesn't mean it will be a done deal, he says. Today's authentication schemes may not hold up to the next wave of threats, so banks need to regularly study their anti-fraud measures to make sure they are still effective, according to the Celent report.

Early on, financial institutions agonized over how they could distribute and then support hardware tokens for authenticating their consumer customers. Managing and provisioning hardware was unwieldy and pricey ($30 a token), so many went with software-based solutions that augment the old standby password. (See Putting Security in the Bank and Banks Launch Authentication Project .)

"Many of the security vendors thought that the FFIEC guidelines would cause tokens to fall from the sky like manna from heaven. It hasn't worked out that way, owing largely to the usual issues -- cost and usability," says Andrew Jacquith, senior analyst with the Yankee Group. Jaquith says hardware tokens are pricier, so software-based authentication, such as PassMark, has emerged as a more affordable and easily provisioned option.

"But these, too, aren't foolproof, and present a learning curve for consumers," Jaquith says.

Celent's Jegher says as soon as you deploy a multi-factor authentication system, however, the bad guys are already working on ways to circumvent it. "There will be attempts to work around it," he says. "And banks will possibly have to add additional security measures."

As always, end users are the weakest link. Jegher points to a recent multi-factor authentication study conducted by Harvard University and MIT to test whether users would look for their authenticating image and phrase before typing in their passwords. They were given their login screen, but without the visual cues that signal they are on their bank's site. It didn't go well for multi-factor, with 97 percent of users logging in, even though the additional authentication layer was missing.

Meanwhile, Celent says banks are way behind in deploying MFA for telephone and mobile banking, which also fall under the FFIEC regulations. Only 30 percent of banks will deploy MFA for telephone banking this year, according to Celent, as many struggle to balance technology with human intervention in the process. Voice authentication holds promise, but Celent doesn't expect it to take off any time soon.

As for mobile banking -- banking over your PDA -- Celent says SMS and WAP will be key to authenticating these transactions, as well as downloadable applications that would run on the PDAs.

Meanwhile, who's inside the bank may be the greater threat: Anywhere from 50 to 70 percent of bank fraud comes from bank employees and other insiders, according to Celent, which plans to tackle the insider threat at banks in an upcoming report.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Yankee Group Research Inc. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    When It Comes To Security Tools, More Isn't More
    Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
    US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
    Seth Rosenblatt, Contributing Writer,  1/11/2021
    IoT Vendor Ubiquiti Suffers Data Breach
    Dark Reading Staff 1/11/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-25533
    PUBLISHED: 2021-01-15
    An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
    CVE-2021-3162
    PUBLISHED: 2021-01-15
    Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
    CVE-2021-21242
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
    CVE-2021-21245
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...
    CVE-2021-21246
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/` endpoint there are no security checks enforced so it is possible to retrieve ar...