Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpgAny user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did you know there’s a security method that uses your mouse’s behavior to authorize your login?

A startup called BioCatch has developed an authentication procedure that analyzes your mouse movements and behavior. Everyone has probably encountered two-factor authentication at some point or another, be it for a bank account login or email inbox access; but we doubt that you’ve ever given mouse two-factor authentication a shot.

According to BioCatch, the way that a PC user uses a mouse can identify who they are. ZDNet explains:

The entire way that we use the human-machine interface embedded within each and every modern computer, browser, or website, is like a unique fingerprint. Lefties will operate a mouse differently to right-handed people, for example, and each user ‘grabs’ an icon at a different point, angle, and so on.

Essentially, BioCatch’s idea looks at the way users move their mouse to build a “character profile,” so to speak. This helps identify whether the user is actually who they say they are. In fact, it’s been estimated that this method of authentication can prevent fraudulent logins up to 80 to 90 percent of the time.

In addition to monitoring your mouse movement, BioCatch’s solution considers other aspects, crammed into four layers of properties:

Layer One: Standard Authentication
Layer one consists of the device, network, IP address, hardware, and location - all traits that physically tie you to your PC. These are the typical authentication properties used when logging into an account. The following layers, however, take a much different approach to authentication.

Layer Two: Physical Profile
Layer two consists of mainly motion-related actions, such as moving objects around the screen, hand-eye coordination, and the mouse pointer (or finger on touch screen devices).

Layer Three: Cognitive Profile
Layer three consists of examining mental abilities, such as response time and connection time. It also looks for suspicious activity that is out of the norm. One example used by ZDnet is online banking - normally, a user would check their balance before doing anything. If a money transfer is their top priority, something might be up.

Layer Four: Invisible Challenges
BioCatch’s final layer of protection is meant to authenticate a user’s identity, but not in the traditional sense. BioCatch purposely puts problems in the way of the user in order to determine who they are. Everyone reacts to potential threats differently, and their response can be used to verify one’s identity.

Will mouse two-factor authentication catch on? We don’t know; but what Total Tech Care does count on is the importance of two-factor authentication in general. Users need to have more than just a password protecting their accounts if they want to stay secure. This is especially important for any business-related material. With today’s sophisticated hacking tools and procedures, all it takes is one skilled hacker to crack a password.

To get started with two-factor authentication, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Upgrade Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Save Money Cloud Computing Office Data Recovery Server Windows 10 Passwords Chrome Tech Term Virtualization Gadgets Social Media Saving Money Holiday Managed Service Microsoft Office Managed IT Services Automation Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things BYOD Mobile Device Management Wi-Fi Health Networking IT Support Managed Service Provider Spam Office 365 Telephone Systems Information Technology Remote Alert Covid-19 Information Social Engineering Mobility Router BDR Employer-Employee Relationship Recovery Bandwidth Encryption Remote Monitoring Big Data Applications App Law Enforcement History Mobile Computing Application Password Human Resources Money Data Breach Mobile Office Government How To Office Tips Training Private Cloud VPN Managed IT Data Storage Patch Management Blockchain Apps Paperless Office Remote Computing HaaS Servers Google Drive Infrastructure Voice over Internet Protocol Data Security Flexibility Avoiding Downtime Marketing Wireless WiFi IT solutions Entertainment Website Gmail Budget Settings Bring Your Own Device Data Management Vulnerability Work/Life Balance Two-factor Authentication Windows 7 Word Mouse Education Physical Security Employee/Employer Relationship Vendor Management Safety User Error RMM Sports Meetings HIPAA Redundancy Keyboard Risk Management Hacker Data Protection The Internet of Things Lithium-ion battery Save Time USB Conferencing Firewall Vendor Cleaning Scam Managed Services Staff Software as a Service Display Virtual Reality Telephone System Apple Machine Learning End of Support Social Connectivity Remote Work Hard Drive Internet Exlporer Google Docs Unsupported Software Identity Theft Computing Charger PDF Wearable Technology Compliance Retail Hard Drives Augmented Reality Proactive IT OneNote Virus Computer Care Instant Messaging Robot Excel Fraud Current Events Unified Threat Management Telephony Best Practice Remote Worker YouTube Computer Accessories Digital Signage Samsung Biometrics Virtual Desktop Black Market Cryptocurrency Value DDoS Procurement Spam Blocking Electronic Medical Records Document Management Workplace Strategy Wireless Technology Printer Comparison Net Neutrality SharePoint Solid State Drive How to Downtime Bluetooth CES Help Desk Hiring/Firing Printing Customer Service Data storage Content Management Automobile Environment Business Technology Access Control Fax Server IT Consultant Managed Services Provider Computing Infrastructure Virtual Assistant Going Green Authentication Business Intelligence Database Humor SaaS Remote Workers Audit Worker IT Management Battery Processor Shadow IT Update Network Congestion Botnet Legal IT Plan eWaste Benefits Tablets HVAC Peripheral Google Apps Workers Best Available Analysis Using Data FENG Politics Entrepreneur Advertising Digital Security Cameras Administrator WIndows 7 Devices Copiers 5G IBM Smart Technology Shortcut Enterprise Content Management Quick Tip Flash Notifications MSP Ergonomics Accountants Smartwatch Cost Management Social Networking Microchip Thought Leadership Development Software Tips Credit Cards OLED Supercomputer Password Manager Virtual Machine Emails Relocation Password Management PCI DSS Sync 2FA Fiber Optics Multi-Factor Security Employee Video Games Search Engine User Twitter Messaging PowerPoint Cabling Running Cable Windows Media Player Business Mangement Hypervisor Netflix Two Factor Authentication Worker Commute Memory NIST Policy Dark mode Smart Tech Trend Micro Root Cause Analysis Trending Experience Music Scalability Managing Stress Addiction SMS HBO Amazon Default App Knowledge Recycling Saving Time Business Owner Procedure Skype Wiring dark theme NarrowBand Practices Shopping Data loss Cameras Google Search Troubleshooting Search Science Cache AI Outlook Amazon Web Services IT Infrastructure Leadership Criminal Bing iPhone Safe Mode FinTech Start Menu GDPR Hosted Computing Social Network Screen Mirroring Loyalty Books Customer Relationship Management Wireless Internet Frequently Asked Questions Online Shopping Investment Distributed Denial of Service Employee/Employer Relationships Windows 10s Analyitcs Files File Sharing Employees Mobile Camera Windows 365 Chromecast Inventory Cast Printer Server Specifications ISP Programming Emergency Wire Video Conferencing Tip of the week Evernote ROI webinar Bitcoin Public Cloud Travel Shortcuts Employer Employee Relationship Colocation Sales Professional Services Uninterrupted Power Supply Printers Point of Sale Personal Millennials Cryptomining Assessment Antivirus Windows 8 Monitor Smart Office Supply Chain Management Windows Server 2008 Wireless Charging Batteries IT service Monitoring Tools Virtual Private Network Windows 8.1 Digitize Workforce Television Tablet Reputation Streaming Media Cables Windows Server 2008 R2 Tech Support Domains Content Customer relationships Techology Project Management Email Best Practices Laptop Nanotechnology IT Assessment Telecommuting Manufacturing Public Computer IaaS Transportation Maintenance Customers Regulations Cortana Consultant Digital Signature Managed IT Service Computer Fan Security Cameras Rootkit Audiobook Bloatware Computer Tips Warranty Virtual CIO Touchpad OneDrive Analytics Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code