{"id":15209,"date":"2020-01-13T08:00:00","date_gmt":"2020-01-13T08:00:00","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=15209"},"modified":"2020-01-10T15:09:31","modified_gmt":"2020-01-10T15:09:31","slug":"securing-against-biometric-threats","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/","title":{"rendered":"Securing against biometric threats"},"content":{"rendered":"\n<p><strong>Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it<\/strong><\/p>\n\n\n\n<p>The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment. <\/p>\n\n\n\n<p>Now that biometric data is becoming more widespread, cyber attacks could get very personal.&nbsp;<\/p>\n\n\n\n<p>As biometric technology develops and becomes more accepted, more companies are using biometrics, rather than passwords, keys, cards or codes, to allow access areas to of their buildings. Biometric data is difficult to fake, making it more secure than traditional methods.&nbsp;<\/p>\n\n\n\n<p>However, once biometric data has been compromised, you cannot make the system secure again, so safeguarding data is vital to security, as well as to staff. There have been serious threats to biometric data that have highlighted the importance of protecting it.<\/p>\n\n\n\n<p><strong>Your finger on the pulse<\/strong><\/p>\n\n\n\n<p>More than one million fingerprints and other sensitive data were exposed by the biometric security firm <em>Biostar 2<\/em> and made available online. <\/p>\n\n\n\n<p>According to BBC News, the data was left unsecured for eight days while the issue was fixed and an unknown number of days prior to its discovery. This news may have panicked companies, such as The World Bank and easyJet, which use fingerprint biometric data within their businesses. <\/p>\n\n\n\n<p>During the leak, 23 gigabytes of data, containing nearly 30 million records, such as facial recognition data and passwords were compromised.<\/p>\n\n\n\n<p>This story highlighted that, despite the obvious benefits of fingerprint scanners, such as increased security and time and cost savings, the risks surrounding biometric data should be fully understood by those implementing and storing it.<\/p>\n\n\n\n<p><strong>Putting a face to the name<\/strong><\/p>\n\n\n\n<p>Fingerprint scanners are not the only form of biometric data being implemented by businesses; facial recognition is also increasing in popularity and is expected to grow to a $7.7 billion industry by 2022, according to Norton.&nbsp;<\/p>\n\n\n\n<p>Tesco is trialling facial recognition at its self-checkout tills to see if customers buying alcohol appear over 18 years old, saving time for employees checking identification. <\/p>\n\n\n\n<p>Tesco is also testing facial recognition at petrol pumps, allowing it to target advertising based on the customer\u2019s age and gender, making its marketing placements more effective and tailored.<\/p>\n\n\n\n<p>Facial recognition is also used in the 67 acres that surround Kings Cross Station and the Information Commissioner\u2019s Office is set to inspect the facial recognition technology to check that it does not break data protection laws for the public. <\/p>\n\n\n\n<p>Manufacturers may also want to turn to facial recognition to enable access on their premises to secure their site. During the process, manufacturers should ensure that they do not infringe on privacy laws and that their systems are encrypted, to maintain the security of their employee\u2019s bioetric data.&nbsp;<\/p>\n\n\n\n<p><strong>Avoiding viruses<\/strong><\/p>\n\n\n\n<p>One method used to specifically target biometric data is viruses. Eurofins Scientific, who deals with more than 70,000 criminal cases for the UK each year, including cases for the British Police, was targeted by a highly sophisticated ransomware virus. Eurofins carries out DNA testing, as well as computer forensics, toxicology analysis and firearms testing.<\/p>\n\n\n\n<p>This is concerning as leaked DNA can cause personal data, such as the person\u2019s medical history, to be compromised. However, this is less worrying in an industrial setting, as DNA testing would be expensive and far too slow in an emergency.<\/p>\n\n\n\n<p>Manufacturers using biometric technology should protect their systems from hackers, like those on the FBI\u2019s most wanted list, by combining biometrics with another form of security. <\/p>\n\n\n\n<p>Biometric authentication, such as facial recognition and fingerprint scanners are not entirely immune to attack and therefore cannot be solely relied on to verify people.<\/p>\n\n\n\n<p>Another solution is blockchain technology, which stores data in a distributed ledger, protected by cryptography in multiple computers globally, only allowing authorised parties to access the data, securing biometric data effectively and safely. This has the added benefit of protecting employee\u2019s personal data.<\/p>\n\n\n\n<p>Biometric data is on the rise and businesses must be wary of the risks, as well as the rewards. To find out more about the latest trends in automation, visit<\/p>\n\n\n\n<p>Jonathan Wilkins is director at automation parts supplier <strong><a href=\"http:\/\/tracking.vuelio.co.uk\/tracking\/click?d=IEK2eAAWLBWf6oUPKZVvJ968GRvmmoAbjyFmfjIYNVjSozKa-CQSEhbm8yy-yMmXgCVM5qPn2g8OQfYlnTgSS4ycVmraxZZE00DTPm7-ZuyIJp3GnRDaVdMRXhlLOahgKw2\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">EU Automation<\/a><\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[7682,7680,7681,50],"class_list":["post-15209","post","type-post","status-publish","format-standard","","category-process","tag-biometric-data","tag-biometrics","tag-cyber-attacks","tag-eu-automation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing against biometric threats - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing against biometric threats - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-13T08:00:00+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Securing against biometric threats\",\"datePublished\":\"2020-01-13T08:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/\"},\"wordCount\":706,\"keywords\":[\"Biometric data\",\"biometrics\",\"cyber-attacks\",\"EU Automation\"],\"articleSection\":[\"Process\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/\",\"name\":\"Securing against biometric threats - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-01-13T08:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/securing-against-biometric-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing against biometric threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing against biometric threats - Engineer News Network","description":"Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/","og_locale":"en_GB","og_type":"article","og_title":"Securing against biometric threats - Engineer News Network","og_description":"Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/","og_site_name":"Engineer News Network","article_published_time":"2020-01-13T08:00:00+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Securing against biometric threats","datePublished":"2020-01-13T08:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/"},"wordCount":706,"keywords":["Biometric data","biometrics","cyber-attacks","EU Automation"],"articleSection":["Process"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/","name":"Securing against biometric threats - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"datePublished":"2020-01-13T08:00:00+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Jonathan Wilkins discusses the growing prevalence of biometric data and what manufacturers can do to secure it","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/securing-against-biometric-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing against biometric threats"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/15209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=15209"}],"version-history":[{"count":2,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/15209\/revisions"}],"predecessor-version":[{"id":15229,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/15209\/revisions\/15229"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=15209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=15209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=15209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}