Digitalization is a double-edged sword for banks, especially when it comes to security. A massive shift to cloud and API-based ways of working has made the sector become more agile and innovative, but it has also opened the floodgates for identity theft. As interactions and transactions become more interconnected, even the simplest processes like opening a new account or making a balance transfer become riddled with security concerns.

As financial services become more digital in nature, it’s important that banks think differently when using data analytics, security tools, and education to improve identity authentication and customer data privacy. Avaya’s research report reveals three critical ways to do so.

1. Make the Most of the Powerful Tool in Your Customers’ Hands

Almost every customer owns a smartphone, and they use that device to call into the contact center when they need to resolve an issue or complicated matter. Have you thought about what can be done with this device to enhance identity authentication? Older security methods like Knowledge-based Authentication (KBA) only prove what a person knows. By leveraging the sensors in a customer’s connected device, banks can go one step further to prove who someone is — and that makes all the difference.

These sensors, which include location services, cameras, and QR code scanning, make a customer’s smart device a valuable source of a vast amount of information and inputs that help banks create a trusted identity template for customers. Once this identity template is established, all transactions are tied directly to a customer’s verified identity. This allows simple but risky transactions like requesting a new debit card, ordering checks, or updating an address to be done simply, quickly, and with far lower risk to the bank and its customers.

2. Shield Sensitive Data from Agents Using Zero Knowledge Proof

When a customer calls into the contact center, all of that person’s information is made visible to the agent who needs to verify them: their address, their driver’s license number, their social security number, etc. What’s stopping an agent from using their cellphone to take a picture of a customer’s personally identifiable information? It’s a scary thought, especially with so many customer service jobs now offsite out of supervisors’ views. Customer service workers don’t need so much visibility into this data.

Zero Knowledge Proof is an advanced cryptographic technique that makes it possible for organizations to verify sensitive or personally identifiable information without revealing that data to workers. The agent doesn’t need to see the data to verify its accuracy or authenticity and will therefore have no knowledge of it — hence, “zero knowledge proof.” All employees will see are the results that matter to them (whether a payment went through, whether a document was signed, that a customer’s SSN checks out) with a green checkmark verifying its approval from whichever third-party company verified it.

3. Outbound Notifications for Fraud Protection

In a sea of scam callers, most customers immediately send unknown numbers to voicemail. This is a major challenge for banks trying to reach customers to perform a number of legitimate tasks and build relationships. By securely sending notifications across the channel of a customer’s choice (SMS, in-app message if the company offers a mobile app), banks can reach customers faster and with high veracity authentication. In this way, customers will receive a notification via text or in-app message before an incoming call asking them to “tap” and log in. They will be instantly authenticated and, if desired, can schedule the call for a convenient time.

These notifications can also be used to simplify routine interactions like checking an account balance or bill pay. For example, a customer can click on the link in a text message their bank sends them reminding them that a payment is due for their credit card. Notifications can be sent for non-payment interactions as well, such as post contact surveys and new customer eForms.  All of this can be done with full PCI compliance. In fact, banks can take their contact center out of the scope of compliance altogether.

Learn more from Avaya’s research about what banks should consider to digitally evolve. View the full report, Five Recent Trends Shaping the Banking Industry.

IT Leadership

In my last column for CIO.com, I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts.  

Among other things, I advocated that in this remote/hybrid work era, CISOs must protect their company’s access to data by having a cyber-attack plan ready to implement, understanding the new tools and tactics that cyber thieves use, and being aware of newer AI-based technologies that can lessen cybersecurity risks. But first and foremost, I stressed that to better protect their organizations, CISOs needed to adopt (if they hadn’t done so already) some of the evolving identity and access management technologies being offered by a crop of emerging companies. 

Responses from other industry professionals generally agreed that there are issues around authentication, including multi-factor authentication (MFA), but some asked, “Isn’t FIDO supposed to eliminate the risks from all that? Didn’t the FIDO Alliance just recently announce new UX guidelines to speed up MFA adoption with FIDO security keys?” Well, yes, but there is more that tech pros can do. I’ll explain more below.  

Why FIDO?

FIDO as an industry initiative was set up a decade ago to standardize the need for strong authentication/password technologies. It’s basically a stronger set of security authentication measures, in essence, a better security ‘handshake’ between the device and a third-party service. Companies in the alliance include board-level members like Apple, Amazon, Meta, Microsoft, Google, and other tech-heavy hitters. Collectively, they are seeking to solve problems caused by users needing to create, maintain and remember multiple usernames and passwords.  

While these initiatives are great, they are only solving an authentication problem between the device and the end service. FIDO provides seamless and secure authentication to a service from a browser, your phone, or an app. But the reality is this is a device authentication, not a human one. There’s still a step on the front end, where the user has to authenticate themselves with the device, and this can be compromised. 

Identity and access – the user authentication challenge 

For example, using my phone’s face recognition access, my kids can hold my phone up to my face, and boom, they have access. All of the added protection provided by FIDO just got wiped out. My kids could have used (and abused) my accounts. Thankfully, I’ve raised them right. Or at least I hope so! 

In addition, someone could create a fake identity representing me on their device. From that point forward the third-party service thinks that I am the user because the device or browser has been authenticated, even though it is really a hacker who has hijacked my identity to set up the device. 

Obviously, there’s still a need for a layer of continuous authentication and user identity management to help protect against these exploits. This is about identifying the user versus the machine on an ongoing basis, not just at set-up or log-in. How can we do a better job of identifying who our real users are, while also eliminating former users (employees and contractors) from the ranks of those who have access to some of the most critical of systems? 

This is where I think that some of the newer products emerging from the start-up world will be very beneficial to protecting our organizations. 

Man vs. machine 

Solving the human user identity and authentication issue is just part of the problem. A recent article in Security Affairs notes that “while people need usernames and passwords to identify themselves, machines also need to identify themselves to one another. But instead of usernames and passwords, machines use keys and certificates that serve as machine identities so they can connect and communicate securely.” These can be also compromised by hackers. 

Managing the identity of devices used in cloud services, SaaS applications, and other systems is perhaps becoming an even bigger problem. Organizations often set up a new web service, create an identity for it and the IT assets associated with it, and once it’s up and running, IT staffers are likely not rushing to change or update security configurations on those systems. Once the initial dependencies are set up between devices, it gets that much harder to sever or update those complex relationships.  

However, good security acumen would determine that those should be refreshed, which can be a huge management problem. As a result, older, stale credentials become a softer target to attack. 

Hackers are increasingly exploiting the credentials of machines, not humans, to launch their attacks. Just like fooling other humans, hackers can fool other machines into handing over sensitive data. According to Security Affairs, given that machine identities are the least understood and weakly protected parts of enterprise networks, it should come as no surprise that cybercriminals are aggressively exploiting them. From Stuxnet to SolarWinds, attackers are increasingly abusing unprotected machine identities to launch a variety of attacks. In fact, over the past four years threats targeting weak machine identities have increased by 400%. 

This is a big deal.  

The bigger picture 

Ultimately, as companies continue to expand their use of hybrid and multi-cloud digital services, the more human and machine entities there will be to manage.  

CIOs must lead IT operations teams to ensure management of the whole identity and access lifecycle for both humans and machines. This is likely to involve new AI-connected tools that seamlessly handle integration, detection, and automation. These tools can equally limit or extend access to certain functions for both human personnel and automated actions, improving security while bringing down costs by pruning unnecessary account licenses. 

In addition, these solutions will fill a void that today still creates major headaches around compliance and reporting. Building a full audit trail into your existing systems is a start. With automations already in place, IT staff can then better manage the governance.  

Ready or not, CIOs and CISOs need to adapt to the evolving identity and access management landscape to adopt a holistic strategy or risk security breaches, failed compliance, and costly fines. 

Authentication, Cyberattacks, Security