Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpgAny user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did you know there’s a security method that uses your mouse’s behavior to authorize your login?

A startup called BioCatch has developed an authentication procedure that analyzes your mouse movements and behavior. Everyone has probably encountered two-factor authentication at some point or another, be it for a bank account login or email inbox access; but we doubt that you’ve ever given mouse two-factor authentication a shot.

According to BioCatch, the way that a PC user uses a mouse can identify who they are. ZDNet explains:

The entire way that we use the human-machine interface embedded within each and every modern computer, browser, or website, is like a unique fingerprint. Lefties will operate a mouse differently to right-handed people, for example, and each user ‘grabs’ an icon at a different point, angle, and so on.

Essentially, BioCatch’s idea looks at the way users move their mouse to build a “character profile,” so to speak. This helps identify whether the user is actually who they say they are. In fact, it’s been estimated that this method of authentication can prevent fraudulent logins up to 80 to 90 percent of the time.

In addition to monitoring your mouse movement, BioCatch’s solution considers other aspects, crammed into four layers of properties:

Layer One: Standard Authentication
Layer one consists of the device, network, IP address, hardware, and location - all traits that physically tie you to your PC. These are the typical authentication properties used when logging into an account. The following layers, however, take a much different approach to authentication.

Layer Two: Physical Profile
Layer two consists of mainly motion-related actions, such as moving objects around the screen, hand-eye coordination, and the mouse pointer (or finger on touch screen devices).

Layer Three: Cognitive Profile
Layer three consists of examining mental abilities, such as response time and connection time. It also looks for suspicious activity that is out of the norm. One example used by ZDnet is online banking - normally, a user would check their balance before doing anything. If a money transfer is their top priority, something might be up.

Layer Four: Invisible Challenges
BioCatch’s final layer of protection is meant to authenticate a user’s identity, but not in the traditional sense. BioCatch purposely puts problems in the way of the user in order to determine who they are. Everyone reacts to potential threats differently, and their response can be used to verify one’s identity.

Will mouse two-factor authentication catch on? We don’t know; but what Total Tech Care does count on is the importance of two-factor authentication in general. Users need to have more than just a password protecting their accounts if they want to stay secure. This is especially important for any business-related material. With today’s sophisticated hacking tools and procedures, all it takes is one skilled hacker to crack a password.

To get started with two-factor authentication, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Office Data Recovery Windows 10 Passwords Social Media Chrome Tech Term Virtualization Gadgets Saving Money Holiday Automation Managed Service Microsoft Office Managed IT Services Operating System Cybercrime Computers Artificial Intelligence Facebook IT Support Hacking Health Internet of Things BYOD Mobile Device Management Wi-Fi Networking Information Technology Information Managed Service Provider Remote Spam Office 365 Alert Covid-19 Telephone Systems Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Bandwidth Encryption Big Data Applications Human Resources Law Enforcement Remote Monitoring Mobile Computing Application Data Breach App Password History Money VPN How To Remote Computing Government Mobile Office Data Storage Private Cloud Patch Management Managed IT Office Tips Blockchain Paperless Office Apps Training Gmail Data Security Settings Google Drive Infrastructure Voice over Internet Protocol Two-factor Authentication Avoiding Downtime Flexibility Mouse Marketing HaaS WiFi IT solutions Vulnerability Entertainment Website Windows 7 Budget Word Bring Your Own Device Data Management Work/Life Balance Servers Wireless Lithium-ion battery Machine Learning End of Support Connectivity Remote Work Physical Security Education Safety Firewall HIPAA Sports Redundancy Keyboard Virtual Reality Apple Social Data Protection User Error Conferencing Vendor Meetings Managed Services Save Time Scam Display USB Risk Management Hacker Cleaning Vendor Management Employee/Employer Relationship Staff The Internet of Things Software as a Service RMM Telephone System Computing Charger SharePoint Battery Compliance Update Shadow IT OneNote Computer Care Legal Current Events Customer Service Environment Google Docs Internet Exlporer Telephony Samsung Digital Signage Identity Theft Fax Server PDF Value SaaS Procurement Augmented Reality Electronic Medical Records Proactive IT Virus Spam Blocking Workplace Strategy Net Neutrality Fraud Best Practice Unified Threat Management Remote Worker Hiring/Firing Help Desk Network Congestion YouTube Computer Accessories Printing eWaste Black Market Cryptocurrency Managed Services Provider Document Management Solid State Drive Comparison Wireless Technology Printer Business Intelligence Database Wearable Technology How to Bluetooth Downtime Retail CES Hard Drives Audit Remote Workers Worker Instant Messaging Excel IT Management Robot Data storage Content Management Processor Business Technology Automobile Access Control Biometrics Botnet IT Plan IT Consultant Virtual Desktop Computing Infrastructure Hard Drive Virtual Assistant Authentication Going Green Humor Unsupported Software DDoS Project Management Smartwatch Nanotechnology Techology Telecommuting Laptop Ergonomics Customers Software Tips Development Supercomputer OLED Distributed Denial of Service Customer Relationship Management Cortana Audiobook Digital Signature Consultant Analyitcs Sync PCI DSS Emails Virtual Machine Fiber Optics Warranty Employee Programming Touchpad Analytics 2FA Messaging Cabling HVAC Google Apps Politics Two Factor Authentication Analysis Advertising Best Available Policy Netflix Hypervisor Dark mode Root Cause Analysis Trend Micro Administrator Antivirus Devices WIndows 7 Windows 8 Notifications HBO SMS Knowledge Default App Enterprise Content Management Music Saving Time MSP IT service Accountants Skype Procedure dark theme Data loss Shopping Microchip Google Search Thought Leadership Credit Cards Password Manager Relocation Tablet Outlook AI Leadership IT Infrastructure Password Management Troubleshooting Bing Domains Multi-Factor Security Start Menu FinTech PowerPoint Screen Mirroring Windows Media Player Social Network Search Engine Loyalty Twitter Video Games User Maintenance Business Mangement Frequently Asked Questions Investment IaaS NIST Worker Commute Books Employee/Employer Relationships Experience Smart Tech Bloatware Trending Mobile Employees Windows 10s Windows 365 Cast ISP Addiction Scalability Managing Stress Amazon Recycling Tablets Tip of the week Video Conferencing webinar ROI Business Owner Emergency Bitcoin Wiring Employer Employee Relationship Shortcuts Practices Entrepreneur NarrowBand Professional Services Cameras Sales Public Cloud Point of Sale Personal Assessment Cryptomining Cache Search Amazon Web Services Shortcut Criminal iPhone Windows Server 2008 Supply Chain Management Safe Mode Batteries GDPR Hosted Computing Cost Management Tools Monitoring Windows 8.1 Digitize Television Wireless Internet Social Networking Online Shopping Files Windows Server 2008 R2 File Sharing Camera Inventory Specifications Chromecast Printer Server Customer relationships Email Best Practices IT Assessment Public Computer Manufacturing Running Cable Wire Evernote Transportation Colocation Memory Travel Uninterrupted Power Supply Regulations Computer Fan Managed IT Service Printers Rootkit Security Cameras Millennials Computer Tips Virtual CIO OneDrive Biometric Security Smart Office Wireless Charging Monitor Benefits Peripheral Workers FENG Using Data Virtual Private Network Workforce Digital Security Cameras Reputation Science Streaming Media Copiers IBM 5G Cables Content Smart Technology Tech Support Flash Quick Tip

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code