Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/18/2013
03:26 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Consumers Want Biometrics, Survey Finds

New Ponemon Institute study shows disillusionment and problems with passwords in online transactions

Most consumers support biometrics for authentication, with voice recognition, facial, and fingerprint scans as their top identity verification methods.

They're also getting frustrated with passwords, with half of them having frequently been unable to conduct an online transaction due to an authentication failure on the website, according to a new survey by The Ponemon Institute and commissioned by Nok Nok Labs. Most of these problems were due to forgotten passwords, usernames, or answers to their preset security questions. Some 60 percent say they would prefer a single, multipurpose identity credential for online and physical access.

But like with most security issues, it's a delicate balance between convenience and actual security: Forty-eight percent don't trust websites or systems that rely solely on passwords, and nearly 40 percent say they don't trust financial service sites that don't require frequent password changes. But they are also tired of password and authentication failures on sites, with less than 50 percent saying authentication failures happen due to problems on the website themselves.

"It seems that people don't have a high degree of trust [with passwords], but they still use" them for online transactions, says Larry Ponemon, chairman and founder of The Ponemon Institute. "And convenience is important: They don't want to remember multiple, complex and long passwords."

The study polled some 1,900 consumers ages 18 to 65 in the U.S., U.K., and Germany, who spent at least 10 hours per week online and conducting online commerce, social networking, and blogging.

Nearly 70 percent of the respondents say that in the past two years they have forgotten one of their passwords because it was too long or complex to retain, and 61 percent were locked out of an online account due to an authentication failure of some sort in the past two years. Some 54 percent of U.S. consumers say it takes too long to reset a password.

"In general, we find folks like multipurpose credentials that would be used for many things because it's more convenient," Ponemon says. "Sixty-three percent would consider or prefer multipurpose credentials."

But the biggest surprise of the survey was how consumers now consider biometrics as an authentication option. Nearly 70 percent of U.S. consumers say biometrics is a viable authentication option. "Five or six years ago, it was no biometrics," says Phillip Dunkelberger, former CEO of PGP and now CEO of startup Nok Nok Labs.

Less than one-third of U.S. and U.K. respondents were against biometrics, with about one-fourth of Germans rejecting the method of authentication. Most support biometrics with "trusted organizations" such as banks, credit card firms, healthcare providers, email providers, or government agencies. Around one-third of consumers in each of the three regions say biometrics would only be acceptable to them if their biometric data was not accessible to the organization they are authenticating to. Voice recognition was by far the most preferred biometric, with 83 to 91 percent of the consumers in favor of it for authentication. Facial scans was next, with 65 to 72 percent of consumers, followed by fingerprints, with 56 to 62 percent of consumers. About half of U.S. and U.K. consumers say iris scanning is acceptable to them, while 66 percent of Germans are in favor of iris scanning biometrics.

The "Moving Beyond Passwords: Consumer Attitudes on Online Authentication" report is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CurtisNeeley
50%
50%
CurtisNeeley,
User Rank: Apprentice
4/25/2013 | 7:04:57 PM
re: Consumers Want Biometrics, Survey Finds
How about printing a number on the forehead that allows forehead prints to be used much the way fingerprints or facial recognition works. lets say something like 222 or 333?
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13552
PUBLISHED: 2019-09-18
In WebAccess versions 8.4.1 and prior, multiple command injection vulnerabilities are caused by a lack of proper validation of user-supplied data and may allow arbitrary file deletion and remote code execution.
CVE-2019-15301
PUBLISHED: 2019-09-18
A SQL injection vulnerability in the method Terrasoft.Core.DB.Column.Const() in Terrasoft Bpm'online CRM-System SDK 7.13 allows attackers to execute arbitrary SQL commands via the value parameter.
CVE-2019-5042
PUBLISHED: 2019-09-18
An exploitable Use-After-Free vulnerability exists in the way FunctionType 0 PDF elements are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free. An attacker can send a malicious PDF to trigger this vulnerability.
CVE-2019-5066
PUBLISHED: 2019-09-18
An exploitable use-after-free vulnerability exists in the way LZW-compressed streams are processed in Aspose.PDF 19.2 for C++. A specially crafted PDF can cause a dangling heap pointer, resulting in a use-after-free condition. To trigger this vulnerability, a specifically crafted PDF document needs ...
CVE-2019-5067
PUBLISHED: 2019-09-18
An uninitialized memory access vulnerability exists in the way Aspose.PDF 19.2 for C++ handles invalid parent object pointers. A specially crafted PDF can cause a read and write from uninitialized memory, resulting in memory corruption and possibly arbitrary code execution. To trigger this vulnerabi...