Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpgAny user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did you know there’s a security method that uses your mouse’s behavior to authorize your login?

A startup called BioCatch has developed an authentication procedure that analyzes your mouse movements and behavior. Everyone has probably encountered two-factor authentication at some point or another, be it for a bank account login or email inbox access; but we doubt that you’ve ever given mouse two-factor authentication a shot.

According to BioCatch, the way that a PC user uses a mouse can identify who they are. ZDNet explains:

The entire way that we use the human-machine interface embedded within each and every modern computer, browser, or website, is like a unique fingerprint. Lefties will operate a mouse differently to right-handed people, for example, and each user ‘grabs’ an icon at a different point, angle, and so on.

Essentially, BioCatch’s idea looks at the way users move their mouse to build a “character profile,” so to speak. This helps identify whether the user is actually who they say they are. In fact, it’s been estimated that this method of authentication can prevent fraudulent logins up to 80 to 90 percent of the time.

In addition to monitoring your mouse movement, BioCatch’s solution considers other aspects, crammed into four layers of properties:

Layer One: Standard Authentication
Layer one consists of the device, network, IP address, hardware, and location - all traits that physically tie you to your PC. These are the typical authentication properties used when logging into an account. The following layers, however, take a much different approach to authentication.

Layer Two: Physical Profile
Layer two consists of mainly motion-related actions, such as moving objects around the screen, hand-eye coordination, and the mouse pointer (or finger on touch screen devices).

Layer Three: Cognitive Profile
Layer three consists of examining mental abilities, such as response time and connection time. It also looks for suspicious activity that is out of the norm. One example used by ZDnet is online banking - normally, a user would check their balance before doing anything. If a money transfer is their top priority, something might be up.

Layer Four: Invisible Challenges
BioCatch’s final layer of protection is meant to authenticate a user’s identity, but not in the traditional sense. BioCatch purposely puts problems in the way of the user in order to determine who they are. Everyone reacts to potential threats differently, and their response can be used to verify one’s identity.

Will mouse two-factor authentication catch on? We don’t know; but what Total Tech Care does count on is the importance of two-factor authentication in general. Users need to have more than just a password protecting their accounts if they want to stay secure. This is especially important for any business-related material. With today’s sophisticated hacking tools and procedures, all it takes is one skilled hacker to crack a password.

To get started with two-factor authentication, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware VoIP Disaster Recovery Android communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Chrome Virtualization Social Media Saving Money Holiday Tech Term Gadgets Automation Managed Service Managed IT Services Microsoft Office Artificial Intelligence Computers Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Office 365 Telephone Systems Covid-19 Information Information Technology Managed Service Provider Spam Alert Remote Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Mobility Password Money App History Mobile Computing Encryption Applications Application Data Breach Human Resources Law Enforcement Remote Monitoring Big Data Apps Blockchain Office Tips Data Storage Paperless Office Patch Management Training VPN Government Remote Computing Private Cloud Mobile Office How To Managed IT Bring Your Own Device Data Management Work/Life Balance Flexibility Marketing Wireless WiFi Vulnerability IT solutions Windows 7 Entertainment Word Website Gmail Budget Google Drive Settings Infrastructure Voice over Internet Protocol Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Cleaning Vendor Risk Management Hacker Managed Services Software as a Service Display Telephone System Conferencing Staff End of Support Machine Learning The Internet of Things Education Physical Security Lithium-ion battery Scam Connectivity Remote Work Safety Employee/Employer Relationship Sports USB HIPAA Redundancy RMM Vendor Management Firewall Keyboard Virtual Reality Apple Data Protection Social User Error Save Time Meetings Retail Hard Drives Business Technology Virus Instant Messaging Content Management Access Control Excel Hiring/Firing Robot Computing Infrastructure Unified Threat Management Going Green Managed Services Provider Virtual Assistant Computer Accessories Biometrics Authentication Database Virtual Desktop Battery Remote Workers Shadow IT DDoS Legal Business Intelligence Processor Update SharePoint Printer Audit Internet Exlporer Worker Bluetooth IT Management Hard Drive Google Docs Customer Service PDF Identity Theft Botnet IT Plan Environment Computing Fax Server Proactive IT IT Consultant Unsupported Software Best Practice Augmented Reality Humor YouTube Charger Fraud SaaS Black Market Compliance Digital Signage Remote Worker OneNote Computer Care Network Congestion Cryptocurrency Current Events eWaste Document Management Telephony Solid State Drive Wireless Technology Samsung How to Downtime Procurement Comparison Net Neutrality Workplace Strategy Value Help Desk Data storage CES Printing Electronic Medical Records Wearable Technology Automobile Spam Blocking Screen Mirroring Wire Video Conferencing Loyalty Evernote ROI Travel Shortcuts Frequently Asked Questions Sales Monitor Bitcoin Books Personal Windows Media Player Millennials Cryptomining User Running Cable Mobile Printers Point of Sale PowerPoint Windows 10s Cast Smart Office Supply Chain Management Memory Wireless Charging Tip of the week Monitoring Reputation webinar Batteries Streaming Media Emergency Digitize Tech Support Employer Employee Relationship Workforce Managing Stress Content Professional Services Virtual Private Network Windows 8.1 Public Cloud Techology Laptop Assessment Cables Windows Server 2008 R2 Windows Server 2008 Customer relationships Cameras Customers Nanotechnology IT Assessment Science Telecommuting Manufacturing Audiobook Tools Project Management Email Best Practices Touchpad Television Cortana Security Cameras Computer Tips Digital Signature Managed IT Service Customer Relationship Management Advertising OneDrive Biometric Security Distributed Denial of Service Politics Warranty Virtual CIO HVAC Peripheral Analyitcs Public Computer Google Apps Notifications Transportation Regulations Digital Security Cameras Printer Server Programming Analysis Using Data Computer Fan Devices Copiers Rootkit 5G Administrator Enterprise Content Management Quick Tip Benefits Smartwatch Antivirus MSP Ergonomics Relocation Workers Accountants Microchip FENG Thought Leadership Development Windows 8 Credit Cards OLED IT service Video Games Password Management PCI DSS IBM Password Manager Virtual Machine Fiber Optics Smart Technology Multi-Factor Security Employee Worker Commute Flash 2FA Search Engine Twitter Messaging Tablet Cabling Experience Domains Scalability Software Tips NIST Policy Supercomputer Business Mangement Hypervisor Smart Tech Trend Micro Trending Business Owner Sync Dark mode Emails Maintenance Addiction SMS NarrowBand Amazon Default App IaaS Consultant Search Procedure Bloatware Recycling Saving Time Practices Shopping Two Factor Authentication Google Search Wiring dark theme Analytics iPhone Netflix Root Cause Analysis Cache AI Tablets Amazon Web Services IT Infrastructure Bing Best Available HBO Safe Mode FinTech Entrepreneur Knowledge Criminal Music Hosted Computing Social Network WIndows 7 Skype GDPR Files Shortcut Data loss Wireless Internet Chromecast Online Shopping Investment Outlook File Sharing Employees Cost Management Leadership Employee/Employer Relationships Troubleshooting Inventory Uninterrupted Power Supply Specifications ISP Start Menu Camera Windows 365 Social Networking Colocation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code