SlideShare a Scribd company logo
1 of 20
Download to read offline
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. Photocopying or electronic distribution of
this document or any of its contents without prior written consent of the publisher violates U.S. copyright law, and is punishable by statutory damages
of up to US$150,000 per infringement, plus attorneys’ fees (17 USC 504 et seq.). Without advance permission, illegal copying includes regular
photocopying, faxing, excerpting, forwarding electronically, and sharing of online access.
Moving Beyond the Password: Consumers’
Views on Authentication
MARCH 2017
Julie Conroy
Sponsored by:
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
2
TABLE OF CONTENTS
IMPACT POINTS .............................................................................................................................................. 3
INTRODUCTION .............................................................................................................................................. 4
METHODOLOGY........................................................................................................................................ 4
THE MARKET DRIVERS .................................................................................................................................... 6
PASSWORDS: EASY, BUT INEFFECTIVE............................................................................................................ 8
ONLINE AND MOBILE AUTHENTICATION METHODS .................................................................................... 10
CONCLUSION ................................................................................................................................................ 18
RELATED AITE GROUP RESEARCH................................................................................................................. 19
ABOUT AITE GROUP...................................................................................................................................... 20
AUTHOR INFORMATION ......................................................................................................................... 20
CONTACT................................................................................................................................................. 20
LIST OF FIGURES
FIGURE 1: SURVEY RESPONDENTS BY GENERATION ...................................................................................... 5
FIGURE 2: TYPE OF DIGITAL BANKING SERVICES USED................................................................................... 5
FIGURE 3: CONSUMERS’ PRIORITIES FOR ONLINE BANKING CAPABILITIES.................................................... 7
FIGURE 4: CONSUMERS’ ATTITUDES TOWARD PASSWORDS......................................................................... 8
FIGURE 5: NUMBER OF UNIQUE PASSWORDS USED BY CONSUMERS........................................................... 9
FIGURE 6: CONSUMERS’ RESPONSE TO FORGOTTEN PASSWORDS ............................................................... 9
FIGURE 7: CONSUMERS’ OPENNESS TO ALTERNATIVE IDENTIFICATION METHODS.................................... 10
FIGURE 8: PERCEIVED EASE-OF-USE OF AUTHENTICATION METHODS ........................................................ 14
FIGURE 9: PERCEIVED EFFECTIVENESS OF AUTHENTICATION METHODS .................................................... 15
FIGURE 10: CONSUMERS’ WILLINGNESS TO ENGAGE WITH VARIOUS AUTHENTICATION METHODS......... 16
FIGURE 11: INCENTIVES’ ABILITY TO SWAY CONSUMER BEHAVIOR ............................................................ 17
FIGURE 12: INCENTIVES’ ABILITY TO SWAY CONSUMER BEHAVIOR BY GENERATION................................. 17
LIST OF TABLES
TABLE A: NOTABLE 2016 DATA BREACHES..................................................................................................... 6
TABLE B: MARKET TRENDS AND IMPLICATIONS............................................................................................. 7
TABLE C: AUTHENTICATION METHODS ........................................................................................................ 11
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
3
IMPACT POINTS
 In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S.
consumers who use online and/or mobile banking in January 2017 to better
understand their attitudes toward and understanding of various authentication
mechanisms.
 With more than six billion data records compromised since 2013, the organized
crime rings behind the majority of financial fraud have a vast amount of data at their
disposal. Criminals are making ample use of this data, which is manifest in the rising
account takeover (ATO) and application fraud losses that are hitting FIs and
merchants alike.
 When Aite Group asked consumers about their key priorities for their financial
institution’s (FI’s) online banking service, ease-of-use was the most important
consideration for all age groups. Robust security and fraud prevention is also
deemed to be very important by the majority of respondents; seniors give this equal
weight with ease of use, with 76% of seniors saying both are very important.
 A key reason why consumers are comfortable with using passwords is because they
are doing so poorly. The majority of consumers are only using a handful of
username/password combinations across their online relationships. Millennials are
the worst offenders, with 77% using between just one and five unique passwords
across all of their online relationships.
 Forty percent to 45% of consumers report feeling extremely or very frustrated when
they can’t get into their banking website due to a forgotten password, with nearly
one in three feeling that level of frustration when they can’t login to an e-commerce
or media site.
 When asked whether they would be willing to switch to an alternative identification
method other than a password, there was a clear correlation between consumers’
openness to change and their age. Forty-eight percent of millennials indicate that
they are very willing to switch methods, with another 47% somewhat willing to
change. In contrast, only 16% of seniors are very willing to learn new methods.
 While 51% of consumers say that they would be willing to proactively sign up for a
variety of stepped-up authentication methods without any form of monetary
incentive, an incremental 24% of consumers say that they would be willing to do so
if the bank offers a cash bonus of US$10 to US$25.
 Given the clear differences in comfort level, understanding, and openness to new
forms of authentication among the various age groups, FIs need to enable a variety
of authentication methods and tailor their education and messaging to the
consumer’s demographic.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
4
INTRODUCTION
Passwords are dead. This message has come from Google execs,
1
the U.S. government,
2
and
myriad fraud and security experts (including those at Aite Group) for most of this decade. Yet
passwords are very much still part of the fabric of online banking and commerce, so rumors of
their death appear to be premature.
One reason for this is inertia; passwords are a well-understood mechanism among consumers
and businesses. Moving to something different is not just a daunting task from an IT perspective;
the far greater concern for many FI and merchant executives is the potential disruption of the
customer experience.
This Impact Report analyzes consumers’ perceptions of various forms of authentication. Based
on the findings, the report concludes with a series of recommendations designed to help
improve both security and the customer experience, which will hopefully speed the process of
declaring the password truly and finally dead.
METHODOLOGY
In this January 2017 research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S.
consumers who use online and/or mobile banking to better understand their attitudes and
understanding of various authentication mechanisms. The sample is in proportion to the U.S.
population for age, gender, income, geographic region, and race. The data have a margin of error
of three points at the 95% level of confidence. Seniors are defined as individuals who were born
before 1946, baby boomers between 1946 and 1964, Gen Xers between 1965 and 1980, and
Gen Yers or millennials between 1981 and 2000 (Figure 1).
1. Daniel Terdiman, “Google Security Exec: ‘Passwords Are Dead,’” CNET, September 10, 2013, accessed
February 15, 2017, https://www.cnet.com/news/google-security-exec-passwords-are-dead/.
2. Barack Obama, “Protecting U.S. Innovation from Cyberthreats,” Wall Street Journal, February 6, 2016,
accessed February 15, 2017, https://www.wsj.com/articles/protecting-u-s-innovation-from-
cyberthreats-1455012003.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
5
Figure 1: Survey Respondents by Generation
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
In terms of digital channel use, 55% of respondents use both online and mobile banking, 35%
use online banking only, and 10% use mobile banking only (Figure 2).
Figure 2: Type of Digital Banking Services Used
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Millennials
35%
Generation X
26%
Baby boomers
32%
Seniors
7%
Respondents' Generation
(N=1,095 U.S. digital bankers)
Online only
35%
Mobile only
10%
Both mobile and
online
55%
Type of Digital Banking Services Used
(N=1,095 U.S. digital bankers)
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
6
THE MARKET DRIVERS
With more than 6 billion data records compromised since 2013, the organized crime rings
behind the majority of financial fraud have a vast amount of data at their disposal. Criminals are
making ample use of this data, which is manifest in the rising ATO and application fraud losses
that are hitting FIs and merchants alike.
3
Table A highlights a handful of the notable data
breaches announced in 2016.
Table A: Notable 2016 Data Breaches
Breached entity Date announced Data compromised
Yahoo! December and
September 2016
1.5 billion records including username, password, phone
number, date of birth, and security questions and
answers
AdultFriendFinder.com November 2016 412 million records including username, password, and
email address
Weebly October 2016 43.5 million records, including username, password,
email address, and IP address
VK.com June 2016 171 million records, including full name, username, clear
text password, email address, and phone number
21st Century Oncology March 2016 2.2 million patient records, including name, social
security number, diagnosis, and insurance information
Source: Aite Group
At the same time that the threat environment is escalating rapidly, FIs and merchants struggle to
find the right balance between security and the user experience. Consumers’ expectations for
digital interactions are being set by the elegant and largely friction-free user experiences
provided by the likes of Amazon, Apple, and Uber. The ability to provide a satisfying and
meaningful customer experience is increasingly a key competitive differentiator.
When Aite Group asked consumers about their key priorities for their FI’s online banking service,
the responses show that ease of use is the most important consideration on average. Robust
security and fraud prevention is also deemed to be very important by the majority of
respondents; seniors give this equal weight with ease of use, with 76% of seniors saying both are
very important (Figure 3). Seventy percent of millennials believe interactive transactional
security to be a very important component in their online banking experience, while this was
less critical for the older age groups. Robust transactional capability in online banking came in
last place relative to the importance of ease of use and fraud prevention; 61% of millennials say
this is very important, while roughly one in two baby boomers, seniors, and Gen Xers believe it
to be very important.
3. See Aite Group’s report EMV: Issuance Trajectory and Impact on Account Takeover and CNP,
May 2016.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
7
Figure 3: Consumers’ Priorities for Online Banking Capabilities
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Table B details some of the key trends shaping FI and merchant decisions around how to evolve
their fraud prevention and authentication strategies.
Table B: Market Trends and Implications
Market trends Market implications
Usernames and passwords
have outlived their useful
life.
The combination of the data breaches and consumers’ unfortunate
tendency to use the same handful of username/password combinations
across all of their online relationships have relegated the credential pair
to a database look-up mechanism, with little security value.
Customer experience is a
competitive differentiator.
FIs and merchants are working to remove friction from the customer
experience in order to meet the rising bar of customer expectations for
the digital user experience.
The threat landscape is
evolving rapidly.
Criminals are adjusting their tactics rapidly; it’s difficult for FIs to be
equally nimble and keep pace.
There is an increasing
ubiquity and use of mobile
devices.
The increasing prevalence of smartphones and tablets provides new
opportunities to deploy stronger authentication mechanisms in a
customer-friendly manner. In addition, inputting usernames and
passwords in a mobile device is a clunky user experience, so many
consumers willingly embrace biometrics and other technologies that are
both easier and more secure.
Source: Aite Group
75%
70%
70%
61%
72%
65%
53%
49%
77%
70%
61%
51%
76%
76%
54%
50%
Ease of use
Behind the scenes fraud
prevention and security
Interactive fraud prevention
and security (i.e., security that
requires the customer to take
additional steps to prove he or
she is the genuine customer)
Robust transactional capability
Q. How important are each of the following to you when you're
considering using your financial institution's online banking services?
- Very important -
Millennials (n=389)
Generation X
(n=284)
Baby boomers
(n=347)
Seniors (n=75)
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
8
PASSWORDS: EASY BUT INEFFECTIVE
Consumers are generally quite comfortable using passwords to access their online bank account,
with very little difference in attitude across the generations (Figure 4). Part of this comfort level
can be attributed to habituation; the username/password combination has been around since
the inception of online commerce, and consumers are quite well trained in their use.
Figure 4: Consumers’ Attitudes Toward Passwords
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Unfortunately, another key reason why consumers are so comfortable with using passwords is
because they are doing so poorly. The majority of consumers are only using a handful of
username/password combinations across their online relationships. Millennials are the worst
offenders, with 77% using between just one and five unique passwords across all of their online
relationships. Sixty-six percent of Gen Xers and 57% of seniors use between one and five
passwords across all of their online relationships. While the majority of baby boomers also use
between one and five passwords across all of their online relationships, 32% of baby boomers
use a different password for each of their online accounts (Figure 5).
Password managers, which enable end users to organize and store unique, complex passwords
can help. These solutions face their own challenges, however, as criminals have recognized that
they hold the proverbial keys to the kingdom. LastPass was successfully breached in 2015, and a
recent report shows that a number of the other password managers have their own security
vulnerabilities. The key lesson is that when it comes to security, there is never a silver bullet.
4
4. Roi Perez, “German Researchers Find Flaws in Nine Major Password Managers, SC Magazine, March 1,
2017, accessed March 6, 2017, https://www.scmagazineuk.com/german-researchers-find-flaws-in-
nine-major-password-managers/article/640998/.
84%
77% 81% 80%
15%
22% 18%
13%
7%
Millennials
(n=389)
Generation X
(n=284)
Baby boomers
(n=347)
Seniors
(n=75)
Q. Which of the following statements best describes your attitude toward
using passwords to access your accounts with your bank or other
financial institution? (N=1,095 U.S. digital bankers)
Passwords
are very
difficult to use
Passwords
are kind of a
pain
Passwords
are fine to
use
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
9
Figure 5: Number of Unique Passwords Used by Consumers
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Part of the reason consumers are lazy about passwords is that it’s hard to remember a different
password for each site, and it’s frustrating when a forgotten password prevents or delays access
to a website and its services. As shown in Figure 6, 40% to 45% of consumers report feeling
extremely or very frustrated when they can’t get into their banking website due to a forgotten
password, with nearly one in three feeling that level of frustration when they can’t login to an e-
commerce or media site.
Figure 6: Consumers’ Response to Forgotten Passwords
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
14%
8%
8%
13%
25%
17%
10%
9%
38%
41%
33%
35%
10%
12%
17%
17%
13%
22%
32%
25%
Millennials
Generation X
Baby boomers
Seniors
Q. How many unique passwords do you use for your online accounts?
(N=1,095 U.S. digital bankers)
1 password 2 passwords
3 to 5 passwords More than 6 passwords
A different password for every account
45%
31%
35%
43%
31%
32%
40%
32%
27%
40%
28%
21%
Banking site
E-commerce site (e.g.,
Amazon or Macy's)
Media site (e.g., Hulu or
Netflix)
Q. Which of the following best describes how you feel when you've
forgotten the password to the following types of sites?
Extremely frustrated or very frustrated
Millennials (n=389)
Generation X
(n=284)
Baby boomers
(n=347)
Seniors (n=75)
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
10
ONLINE AND MOBILE AUTHENTICATION
METHODS
The username/password combination became the industry standard for online user
identification more than two decades ago. Criminals have long since proven adept at
compromising this capability, yet it still remains the predominant initial means of user
identification. The increasing ubiquity of mobile devices, however, provides new opportunities to
provide superior authentication capabilities with minimal impact to the user experience.
Within the mobile channel, replacing the need to enter a username/password with a biometric
actually provides the opportunity to increase security while improving the customer experience.
A number of large FIs, including Bank of America, U.S. Bank, Chase, and USAA, have already
given their customers the choice of logging into the mobile app with their fingerprint.
When asked whether they would be willing to switch to an alternative identification method
other than a password, there was a clear correlation between consumers’ openness to change
and their age. Forty-eight percent of millennials indicate that they are very willing to switch
methods, with another 47% somewhat willing to change. In contrast, only 16% of seniors are
very willing to learn new methods (Figure 7).
Figure 7: Consumers’ Openness to Alternative Identification Methods
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
48%
40%
29%
16%
47%
42%
53%
48%
4%
9%
9%
11%
10%
9%
25%
Millennials
Generation X
Baby boomers
Seniors
Q. How willing would you be to switch to another identification method
other than passwords to access your accounts with your bank or other
financial institution?
(N=1,095 U.S. digital bankers)
Very willing Somewhat willing Not at all willing Don’t know
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
11
A number of viable alternatives to passwords are already in use, as described in Table C.
Table C: Authentication Methods
Authentication
type
Description Pros Cons
Device
fingerprint (or
device
identification)
Device identification
technology examines a
combination of
identifiable hardware and
software attributes
associated with a
computer or mobile
device.
Transparent to the end
user
Can be used to provide
recognition of devices
associated with
fraudulent activity as well
as ongoing recognition of
devices with trusted
reputations
While highly reliable in
the mobile app
environment, the device
fingerprint is less
permanent in the browser
environment.
Device
location
It uses sensors native to
the mobile device to
identify the device’s
location.
Transparent to the end
user
Reliable risk indicator,
particularly when used in
conjunction with other
layers of protection
Many businesses are
concerned about a “big
brother” stigma and
enable this on an opt-in
basis.
Eye vein
biometric
It uses the device’s video
recorder to capture the
end user’s eyes, then
applies pattern
recognition to
authenticate the eye
veins.
Very accurate, low level
of false positives and false
negatives
It’s less user-friendly than
facial recognition or
fingerprint, due to the
need to capture a close-
up of the eyes.
Facial
recognition
It uses the device’s video
recorder to capture the
end user’s face and
typically requires user to
blink to perform liveliness
check.
Works well with camera-
enabled devices
Good level of security if
used in conjunction with
device fingerprint
Some consumers will not
want to enable their
video.
Liveliness tests are
susceptible to spoofing.
Fingerprint
biometric
It leverages a device’s
embedded fingerprint
reader; remote channel
use cases are currently
focused on the mobile
channel.
Decent level of security if
used in conjunction with
device fingerprint,
certainly superior to
usernames and passwords
Easy to use
The sensors in mobile
devices are cheap and
lack liveliness tests.
It is hard to get a good
read on some consumers,
particularly seniors or
manual laborers, as
fingerprints erode over
time.
Apple permits nine
fingerprints to be
associated with the
device but doesn’t tell the
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
12
Authentication
type
Description Pros Cons
FI whose fingerprint is in
use.
Knowledge-
based
authentication
(KBA)
KBA questions provide an
additional layer of identity
verification by
establishing that the end
user knows the answer to
one or more personal
questions.
Works with all device
types and is understood
by consumers
Due to data breaches and
consumers’ penchant for
oversharing on social
media, criminals have
easy access to much of
the data upon which the
KBA questions are based.
Mobile
network
operator
(MNO) data
Through direct, real-time
interfaces with MNOs,
this technology uses the
same device hardware-
based network
authentication as MNOs
to secure its own services.
This enables positive
verification that the
device belongs to the
person authorized on the
mobile account as well as
to provide notification if
the device is lost or
stolen.
Transparent to the end
user
Highly effective, given the
reliance on source data
from the MNO
Fraudsters have started
perpetrating ATO attacks
at the MNO level.
One-time
password
(OTP)
Sending a one-time
password to a mobile
device provides the ability
to verify that the user has
that device in his or her
possession.
Used in an increasing
number of use cases and
well-understood by many
consumers
Secure when delivered by
mobile app push to
authenticate a transaction
taking place online or in
the contact center
If the transaction is
performed in the mobile
channel, then the OTP has
limited value, since it
does not provide a second
factor of authentication.
While OTP delivery via
mobile app push is quite
secure, SMS-based OTP
delivery is vulnerable to
SIM-swaps and malware-
based attacks.
Two-way text This is an SMS message
sent to the consumer, to
which they can reply,
either approving or
denying the transaction.
Ubiquitous—works for
consumers with all types
of mobile phones
Provides an opportunity
for a quick and easy
dialogue between the
business and its customer
SMS is susceptible to
spoof, and delivery is not
as certain as it is in the
mobile app environment.
Voice
recognition
It creates a unique
biometric driven by the
Minimally intrusive on the
user experience and can
be completely
Technology is still subject
to false positives.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
13
Authentication
type
Description Pros Cons
characteristics of the end
user’s voice.
transparent if passive
biometrics are used
Applicable to a wide
range of devices
Source: Aite Group
When Aite Group surveyed consumers about the ease of use and effectiveness of various forms
of authentication (Figure 8), a few key learnings emerged:
 Familiarity equates to ease of use for many consumers; over 50% of all consumers
deem username and password very easy to use (since most are using the same
handful of usernames and passwords across all of their online relationships).
Fingerprint biometrics come in second for ease of use, although seniors give it
significantly lower marks than millennials, likely due to the fact that seniors tend to
have lower read rates than younger generations.
 Consumers don’t understand many of these concepts, even when provided with a
brief description. Familiarity has a clear correlation with age—seniors are most likely
to respond “Don’t know” when asked about an authentication method, while
millennials show the greatest degree of familiarity with the alternative
authentication methods presented. The fact that device identification and device
location—technologies that are completely transparent to the consumer—received
relatively low marks for ease of use shows that these concepts are not well
understood.
 While the millennials are stereotyped as being the “selfie” generation, only 41%
believe that using the selfie as an authenticator is very easy. Username/password,
the fingerprint biometric, device identification, and KBA all came in higher in
perceived ease of use for this group. This could indicate that what works for social
media does not easily translate to transactional activity without a concerted effort at
education.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
14
Figure 8: Perceived Ease of Use of Authentication Methods
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
When asked about their perceptions of the effectiveness of each of these technologies,
consumers clearly believe that the fingerprint and the eye biometrics have the edge (Figure 9).
Opinions regarding the effectiveness of username/password were mixed; while 43% of
millennials deem username/password to be very effective, only 16% of seniors share this
opinion. Seniors are also more skeptical of KBA—while one in three millennials believe KBA to be
very effective, that opinion is shared by just 13% of seniors (potentially meaning this group reads
the news a bit more and is more aware of the vulnerabilities of both the password and KBA in
this era of data breaches). While device identification ranked fairly low in terms of perceived
effectiveness, many of the respondents also indicated that they didn’t have a good
66%
59%
58%
56%
55%
48%
49%
36%
49%
45%
44%
43%
45%
31%
31%
25%
41%
38%
37%
25%
41%
34%
30%
17%
37%
35%
35%
24%
38%
33%
35%
28%
25%
31%
35%
39%
31%
31%
30%
37%
37%
38%
41%
41%
36%
43%
35%
25%
32%
30%
33%
40%
35%
39%
37%
37%
34%
33%
32%
28%
34%
38%
32%
31%
5%
8%
6%
5%
9%
8%
9%
8%
10%
10%
10%
8%
13%
13%
14%
25%
15%
14%
15%
15%
14%
12%
12%
15%
16%
16%
15%
15%
18%
15%
17%
11%
3%
2%
2%
0%
3%
4%
3%
4%
6%
6%
5%
3%
5%
4%
5%
4%
8%
7%
6%
4%
6%
4%
5%
5%
10%
9%
16%
4%
4%
8%
4%
10%
17%
20%
5%
12%
10%
17%
5%
11%
16%
27%
5%
10%
12%
29%
4%
11%
11%
25%
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby Boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Username
andpassword
Fingerprint
biometric
Knowledge-
based
authentication
Device
identification
Facial
recognition
Device
locationEyebiometric
Voice
recognition
Q. Thinking about the same identification methods, how difficult or easy do you think
each is to use? (N=1,095 U.S. digital bankers)
Very easy Somewhat easy Somewhat difficult Very difficult Don’t know
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
15
understanding of the technology, which makes sense since it operates entirely behind the
scenes.
Figure 9: Perceived Effectiveness of Authentication Methods
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
When asked about willingness to engage with specific authentication methods at the time of
logging into an account, two-way text has a slight edge as the preferred method of interaction
among all age groups, followed by mobile app push (Figure 10). SMS messages and mobile app
51%
49%
50%
41%
42%
41%
43%
43%
43%
34%
26%
16%
33%
29%
23%
13%
36%
35%
32%
21%
35%
24%
18%
5%
31%
22%
21%
9%
28%
15%
9%
34%
26%
26%
27%
34%
28%
24%
15%
37%
43%
42%
40%
41%
37%
35%
36%
35%
29%
27%
32%
36%
38%
28%
40%
31%
31%
29%
25%
32%
29%
21%
21%
9%
13%
10%
13%
12%
13%
13%
11%
16%
21%
29%
36%
21%
25%
33%
29%
18%
19%
22%
11%
18%
21%
30%
17%
21%
25%
25%
29%
22%
26%
29%
27%
4%
3%
4%
4%
5%
6%
5%
5%
1%
1%
3%
5%
4%
7%
7%
12%
6%
7%
6%
8%
6%
8%
10%
9%
11%
11%
9%
12%
13%
17%
23%
23%
9%
10%
15%
7%
12%
15%
27%
3%
3%
3%
9%
5%
10%
14%
28%
5%
10%
14%
28%
6%
12%
17%
24%
5%
13%
19%
29%
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Fingerprint
biometricEyebiometric
Usernameand
password
Knowledge-
based
authentication
Facial
recognitionvia
thedevice's
camera
Device
identification
Voice
recognition
Device
location
Q. How effective do you think each of the following is at accurately identifying you and
preventing others from accessing your accounts? (N=1,095 U.S. digital bankers)
Very effective Effective Somewhat effective Not at all effective Don’t know
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
16
push are already used by many FIs as a way to deliver alerts. This can serve as a path to
habituation, that is, a way to train consumers to engage with these capabilities not only for
notification of events, but for authentication as well.
Figure 10: Consumers’ Willingness to Engage With Various Authentication Methods
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Consumers can be bought, and there is plenty of precedent that shows that incentives can go a
long way toward influencing customer behavior. A prime example of this is the lukewarm
reception that consumers have given open-loop mobile wallets such as Apple Pay and Android
Pay. Fewer than 10% of U.S. banked consumers regularly use these open-loop mobile wallets,
which provide little incentive for consumers to change their behavior aside from a “cool factor.”
In contrast, Starbucks now sees over 25% of its total U.S. payment volume coming in through its
mobile app, which provides free caffeinated beverages in exchange for regular use.
5
While 51% of consumers say that they would be willing to proactively sign up for a variety of
stepped-up authentication methods without any form of monetary incentive, an incremental
24% of consumers say that they would be willing to do so if the bank offers a cash bonus of
US$10 to US$25 (Figure 11).
5. Rian Boden, “Mobile Payments Account for 25% of all U.S. Starbucks Transactions,” NFC World,
November 8, 2016, accessed March 1, 2017, https://www.nfcworld.com/2016/11/08/348311/mobile-
payments-account-25-us-starbucks-transactions/
30%
23%
19%
24%
28%
19%
11%
17%
22%
14%
12%
12%
23%
17%
13%
13%
36%
32%
31%
16%
35%
29%
24%
9%
28%
27%
23%
17%
32%
28%
25%
21%
25%
31%
25%
24%
27%
34%
29%
23%
28%
35%
38%
33%
28%
29%
32%
29%
9%
14%
26%
36%
10%
19%
36%
51%
22%
24%
27%
37%
17%
25%
30%
36%
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
Millennials
Generation X
Baby boomers
Seniors
2-waytextMobileapppushVoicerecognition
Facial
recognitionvia
thedevice's
camera
Q. How interested would you be to sign up for the following verification methods?
(N=1,095 U.S. digtial bankers)
Very interested Interested Somewhat interested Not at all interested
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
17
Figure 11: Incentives’ Ability to Sway Consumer Behavior
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Millennials are the most receptive to a new authentication experience, with 62% of millennials
willing to engage with new authentication methods without the incentive, while seniors, at one
in three, are the least receptive. The impact of the cash incentive on adoption is roughly equal
across the generations, with the cash incentive increasing senior adoption by 17% and 25% for
millennials (Figure 12).
Figure 12: Incentives’ Ability to Sway Consumer Behavior by Generation
Source: Aite Group survey of 1,095 U.S. consumers, January 2017.
Interested without
incentive
51%
Interested with
incentive at $10
15%
Interested with
incentive at $25
9%
Not interested
with or without
incentive
25%
Change in Interest Level Due to Incentives
(N=1,095 U.S. mobile or online bankers)
62%
53%
40%
33%
15%
15%
15%
10%
10%
8%
9%
7%
13%
24%
36%
50%
Millennials
Generation X
Baby boomers
Seniors
Change in interest level due to incentives by generation
(N=1,095 U.S. mobile or online bankers)
Interested without incentive Interested with incentive at $10
Interested with incentive at $25 Not interested with or without incentive
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
18
CONCLUSION
The need for FIs and merchants to move beyond a password for customer authentication is clear.
Here are a few recommendations for executives as they are plotting their course.
 Start with the mobile channel. The mobile environment lends itself very nicely to
expanding authentication methods, since keying the username/password into the
tiny mobile keyboard is already a suboptimal user experience. Transitioning
authentication to a biometric increases security while concurrently improving the
customer experience.
 Enable multiple forms of authentication. A layered approach to authentication has
long been a best practice—starting with technologies that are transparent to the
end user, then selectively introducing stepped-up authentication measures
commensurate with the context and risk of the transaction. Enabling multiple forms
of stepped-up authentication provides flexibility—if criminals begin to exploit a
vulnerability in a particular authenticator, then the FI or merchant can shift nimbly
to another method. This approach also has the potential to give consumers the
ability to choose the form of authentication with which they are most comfortable.
The data shows that what works for millennials may not be the best option for baby
boomers or seniors.
 Leverage the complementary nature of notification and authentication strategies.
Consumers are becoming accustomed to receiving alerts and notifications from their
FI via SMS and the mobile app. As that behavior pattern takes hold, it is a relatively
small step to then move to using those channels for authentication as well.
 Tailor education to customers’ demographic group. The data clearly shows widely
differing comfort and understanding of the various forms of authentication. FIs and
merchants need to take this into consideration as they are tailoring their messaging
and educational efforts.
 Consider providing incentives to shift behavior. Changing ingrained habits is always
difficult, and the use of passwords is certainly a comfortable habit for most
consumers. As Starbucks has shown with the success of its mobile app, however,
consumers respond to incentives, and the research shows that millennials will be
particularly responsive.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
19
RELATED AITE GROUP RESEARCH
Top 10 Trends in Retail Banking & Payments, 2017: Data Analytics Differentiate, January 2017.
Global Security Engagement ScorecardTM
, November 2016.
Biometrics: The Time Has Come, October, 2016.
2016 Global Consumer Card Fraud: Where Card Fraud Is Coming From, July 2016.
EMV: Issuance Trajectory and Impact on Account Takeover and CNP, May 2016.
Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017
© 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited.
101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com
20
ABOUT AITE GROUP
Aite Group is a global research and advisory firm delivering comprehensive, actionable advice on
business, technology, and regulatory issues and their impact on the financial services industry.
With expertise in banking, payments, insurance, wealth management, and the capital markets,
we guide financial institutions, technology providers, and consulting firms worldwide. We
partner with our clients, revealing their blind spots and delivering insights to make their
businesses smarter and stronger. Visit us on the web and connect with us on Twitter and
LinkedIn.
AUTHOR INFORMATION
Julie Conroy
+1.617.398.5045
jconroy@aitegroup.com
Research Design and Data:
Sarah Fitzsimmons
+1.617.398.5039
sfitzsimmons@aitegroup.com
CONTACT
For more information on research and consulting services, please contact:
Aite Group Sales
+1.617.338.6050
sales@aitegroup.com
For all press and conference inquiries, please contact:
Aite Group PR
+1.617.398.5048
pr@aitegroup.com
For all other inquiries, please contact:
info@aitegroup.com

More Related Content

What's hot

American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustBenjamin Wyrick
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...
Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...
Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...Mitek
 
Мобильные технологии в странах мира (обзор 2012 года)
Мобильные технологии в странах мира (обзор 2012 года)Мобильные технологии в странах мира (обзор 2012 года)
Мобильные технологии в странах мира (обзор 2012 года)Victor Gridnev
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Banking Trend Tracker Newsletter 3.13.09
Banking Trend Tracker Newsletter 3.13.09Banking Trend Tracker Newsletter 3.13.09
Banking Trend Tracker Newsletter 3.13.09David Stutts
 
Understanding Gen Z: How will they shape the world of credit and consumerism?
Understanding Gen Z: How will they shape the world of credit and consumerism?Understanding Gen Z: How will they shape the world of credit and consumerism?
Understanding Gen Z: How will they shape the world of credit and consumerism?Experian
 
Credit outlook for Millennials and Gen Z
Credit outlook for Millennials and Gen ZCredit outlook for Millennials and Gen Z
Credit outlook for Millennials and Gen ZExperian
 
Smart Promotions for Smart Phones
Smart Promotions for Smart PhonesSmart Promotions for Smart Phones
Smart Promotions for Smart PhonesRachel Hamilton
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
Future of banking - Futurist, Anders Sörman-Nilsson
Future of banking - Futurist, Anders Sörman-NilssonFuture of banking - Futurist, Anders Sörman-Nilsson
Future of banking - Futurist, Anders Sörman-NilssonAnders Sorman-Nilsson
 
Consumer Awareness of Credit Scores
Consumer Awareness of Credit ScoresConsumer Awareness of Credit Scores
Consumer Awareness of Credit ScoresFiserv
 
Mobile payment.and.myanmar.jul2014
Mobile payment.and.myanmar.jul2014Mobile payment.and.myanmar.jul2014
Mobile payment.and.myanmar.jul2014Zaw Aung
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowDigiliti Money
 

What's hot (16)

Marketing plan
Marketing planMarketing plan
Marketing plan
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...
Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...
Trends 2013: Five Trends Shaping The Next Generation Of North American Digita...
 
Мобильные технологии в странах мира (обзор 2012 года)
Мобильные технологии в странах мира (обзор 2012 года)Мобильные технологии в странах мира (обзор 2012 года)
Мобильные технологии в странах мира (обзор 2012 года)
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Banking Trend Tracker Newsletter 3.13.09
Banking Trend Tracker Newsletter 3.13.09Banking Trend Tracker Newsletter 3.13.09
Banking Trend Tracker Newsletter 3.13.09
 
Understanding Gen Z: How will they shape the world of credit and consumerism?
Understanding Gen Z: How will they shape the world of credit and consumerism?Understanding Gen Z: How will they shape the world of credit and consumerism?
Understanding Gen Z: How will they shape the world of credit and consumerism?
 
Credit outlook for Millennials and Gen Z
Credit outlook for Millennials and Gen ZCredit outlook for Millennials and Gen Z
Credit outlook for Millennials and Gen Z
 
Smart Promotions for Smart Phones
Smart Promotions for Smart PhonesSmart Promotions for Smart Phones
Smart Promotions for Smart Phones
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Future of banking - Futurist, Anders Sörman-Nilsson
Future of banking - Futurist, Anders Sörman-NilssonFuture of banking - Futurist, Anders Sörman-Nilsson
Future of banking - Futurist, Anders Sörman-Nilsson
 
Consumer Awareness of Credit Scores
Consumer Awareness of Credit ScoresConsumer Awareness of Credit Scores
Consumer Awareness of Credit Scores
 
Mobile payment.and.myanmar.jul2014
Mobile payment.and.myanmar.jul2014Mobile payment.and.myanmar.jul2014
Mobile payment.and.myanmar.jul2014
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
 

Similar to Authentication best practices: Experts weigh in

Blueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-WhitepaperBlueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-WhitepaperBenjamin Wyrick
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALPeggy Lawless
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdfIdentity Herald
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationBee_Ware
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemAjay Shibu
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemAjay Shibu
 
How Testing FinTech Supports Catering to the Baby Boomers
   How Testing FinTech Supports Catering to the Baby Boomers   How Testing FinTech Supports Catering to the Baby Boomers
How Testing FinTech Supports Catering to the Baby BoomersCigniti Technologies Ltd
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trustOptimediaSpain
 
Veber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer reportVeber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer reportMarie Johnson
 
Banking on Change EVP 2016 Fintech Report
Banking on Change EVP 2016 Fintech ReportBanking on Change EVP 2016 Fintech Report
Banking on Change EVP 2016 Fintech ReportJak Kennedy
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy ReportFigLeaf
 
Finance + The Machine: who will win the trust battle?
Finance + The Machine: who will win the trust battle?Finance + The Machine: who will win the trust battle?
Finance + The Machine: who will win the trust battle?Preriit (Prerit) Souda
 
200806 inn counterpoint_bridging_agegap
200806 inn counterpoint_bridging_agegap200806 inn counterpoint_bridging_agegap
200806 inn counterpoint_bridging_agegapSteven Callahan
 

Similar to Authentication best practices: Experts weigh in (20)

Blueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-WhitepaperBlueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-Whitepaper
 
TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Unify How You Verify.pdf
Unify How You Verify.pdfUnify How You Verify.pdf
Unify How You Verify.pdf
 
Moving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authenticationMoving beyond passwords - Consumer attitudes on online authentication
Moving beyond passwords - Consumer attitudes on online authentication
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 
How Testing FinTech Supports Catering to the Baby Boomers
   How Testing FinTech Supports Catering to the Baby Boomers   How Testing FinTech Supports Catering to the Baby Boomers
How Testing FinTech Supports Catering to the Baby Boomers
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
Veber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer reportVeber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer report
 
Banking on Change EVP 2016 Fintech Report
Banking on Change EVP 2016 Fintech ReportBanking on Change EVP 2016 Fintech Report
Banking on Change EVP 2016 Fintech Report
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
Finance + The Machine: who will win the trust battle?
Finance + The Machine: who will win the trust battle?Finance + The Machine: who will win the trust battle?
Finance + The Machine: who will win the trust battle?
 
200806 inn counterpoint_bridging_agegap
200806 inn counterpoint_bridging_agegap200806 inn counterpoint_bridging_agegap
200806 inn counterpoint_bridging_agegap
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 

More from Abhishek Sood

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management Abhishek Sood
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps teamAbhishek Sood
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Abhishek Sood
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business powerAbhishek Sood
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9MAbhishek Sood
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to knowAbhishek Sood
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and moreAbhishek Sood
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?Abhishek Sood
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approachAbhishek Sood
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management Abhishek Sood
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructureAbhishek Sood
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformationAbhishek Sood
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industriesAbhishek Sood
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsAbhishek Sood
 

More from Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Tips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data AnalyticsTips --Break Down the Barriers to Better Data Analytics
Tips --Break Down the Barriers to Better Data Analytics
 

Recently uploaded

Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...poojakaurpk09
 
Internship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkInternship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkSujalTamhane
 
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.GabrielaMiletti
 
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Standkumarajju5765
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理cowagem
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Pooja Nehwal
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...amitlee9823
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...sonalitrivedi431
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...ranjana rawat
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
 
Internship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkInternship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmk
 
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.
 
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Janakpuri ☎ 9711199171 Book Your One night Stand
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理
 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...Escorts Service Cambridge Layout  ☎ 7737669865☎ Book Your One night Stand (Ba...
Escorts Service Cambridge Layout ☎ 7737669865☎ Book Your One night Stand (Ba...
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
Hyderabad 💫✅💃 24×7 BEST GENUINE PERSON LOW PRICE CALL GIRL SERVICE FULL SATIS...
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...
Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...
Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...
 
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
 

Authentication best practices: Experts weigh in

  • 1. © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. Photocopying or electronic distribution of this document or any of its contents without prior written consent of the publisher violates U.S. copyright law, and is punishable by statutory damages of up to US$150,000 per infringement, plus attorneys’ fees (17 USC 504 et seq.). Without advance permission, illegal copying includes regular photocopying, faxing, excerpting, forwarding electronically, and sharing of online access. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 Julie Conroy Sponsored by:
  • 2. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 2 TABLE OF CONTENTS IMPACT POINTS .............................................................................................................................................. 3 INTRODUCTION .............................................................................................................................................. 4 METHODOLOGY........................................................................................................................................ 4 THE MARKET DRIVERS .................................................................................................................................... 6 PASSWORDS: EASY, BUT INEFFECTIVE............................................................................................................ 8 ONLINE AND MOBILE AUTHENTICATION METHODS .................................................................................... 10 CONCLUSION ................................................................................................................................................ 18 RELATED AITE GROUP RESEARCH................................................................................................................. 19 ABOUT AITE GROUP...................................................................................................................................... 20 AUTHOR INFORMATION ......................................................................................................................... 20 CONTACT................................................................................................................................................. 20 LIST OF FIGURES FIGURE 1: SURVEY RESPONDENTS BY GENERATION ...................................................................................... 5 FIGURE 2: TYPE OF DIGITAL BANKING SERVICES USED................................................................................... 5 FIGURE 3: CONSUMERS’ PRIORITIES FOR ONLINE BANKING CAPABILITIES.................................................... 7 FIGURE 4: CONSUMERS’ ATTITUDES TOWARD PASSWORDS......................................................................... 8 FIGURE 5: NUMBER OF UNIQUE PASSWORDS USED BY CONSUMERS........................................................... 9 FIGURE 6: CONSUMERS’ RESPONSE TO FORGOTTEN PASSWORDS ............................................................... 9 FIGURE 7: CONSUMERS’ OPENNESS TO ALTERNATIVE IDENTIFICATION METHODS.................................... 10 FIGURE 8: PERCEIVED EASE-OF-USE OF AUTHENTICATION METHODS ........................................................ 14 FIGURE 9: PERCEIVED EFFECTIVENESS OF AUTHENTICATION METHODS .................................................... 15 FIGURE 10: CONSUMERS’ WILLINGNESS TO ENGAGE WITH VARIOUS AUTHENTICATION METHODS......... 16 FIGURE 11: INCENTIVES’ ABILITY TO SWAY CONSUMER BEHAVIOR ............................................................ 17 FIGURE 12: INCENTIVES’ ABILITY TO SWAY CONSUMER BEHAVIOR BY GENERATION................................. 17 LIST OF TABLES TABLE A: NOTABLE 2016 DATA BREACHES..................................................................................................... 6 TABLE B: MARKET TRENDS AND IMPLICATIONS............................................................................................. 7 TABLE C: AUTHENTICATION METHODS ........................................................................................................ 11
  • 3. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 3 IMPACT POINTS  In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking in January 2017 to better understand their attitudes toward and understanding of various authentication mechanisms.  With more than six billion data records compromised since 2013, the organized crime rings behind the majority of financial fraud have a vast amount of data at their disposal. Criminals are making ample use of this data, which is manifest in the rising account takeover (ATO) and application fraud losses that are hitting FIs and merchants alike.  When Aite Group asked consumers about their key priorities for their financial institution’s (FI’s) online banking service, ease-of-use was the most important consideration for all age groups. Robust security and fraud prevention is also deemed to be very important by the majority of respondents; seniors give this equal weight with ease of use, with 76% of seniors saying both are very important.  A key reason why consumers are comfortable with using passwords is because they are doing so poorly. The majority of consumers are only using a handful of username/password combinations across their online relationships. Millennials are the worst offenders, with 77% using between just one and five unique passwords across all of their online relationships.  Forty percent to 45% of consumers report feeling extremely or very frustrated when they can’t get into their banking website due to a forgotten password, with nearly one in three feeling that level of frustration when they can’t login to an e-commerce or media site.  When asked whether they would be willing to switch to an alternative identification method other than a password, there was a clear correlation between consumers’ openness to change and their age. Forty-eight percent of millennials indicate that they are very willing to switch methods, with another 47% somewhat willing to change. In contrast, only 16% of seniors are very willing to learn new methods.  While 51% of consumers say that they would be willing to proactively sign up for a variety of stepped-up authentication methods without any form of monetary incentive, an incremental 24% of consumers say that they would be willing to do so if the bank offers a cash bonus of US$10 to US$25.  Given the clear differences in comfort level, understanding, and openness to new forms of authentication among the various age groups, FIs need to enable a variety of authentication methods and tailor their education and messaging to the consumer’s demographic.
  • 4. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 4 INTRODUCTION Passwords are dead. This message has come from Google execs, 1 the U.S. government, 2 and myriad fraud and security experts (including those at Aite Group) for most of this decade. Yet passwords are very much still part of the fabric of online banking and commerce, so rumors of their death appear to be premature. One reason for this is inertia; passwords are a well-understood mechanism among consumers and businesses. Moving to something different is not just a daunting task from an IT perspective; the far greater concern for many FI and merchant executives is the potential disruption of the customer experience. This Impact Report analyzes consumers’ perceptions of various forms of authentication. Based on the findings, the report concludes with a series of recommendations designed to help improve both security and the customer experience, which will hopefully speed the process of declaring the password truly and finally dead. METHODOLOGY In this January 2017 research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking to better understand their attitudes and understanding of various authentication mechanisms. The sample is in proportion to the U.S. population for age, gender, income, geographic region, and race. The data have a margin of error of three points at the 95% level of confidence. Seniors are defined as individuals who were born before 1946, baby boomers between 1946 and 1964, Gen Xers between 1965 and 1980, and Gen Yers or millennials between 1981 and 2000 (Figure 1). 1. Daniel Terdiman, “Google Security Exec: ‘Passwords Are Dead,’” CNET, September 10, 2013, accessed February 15, 2017, https://www.cnet.com/news/google-security-exec-passwords-are-dead/. 2. Barack Obama, “Protecting U.S. Innovation from Cyberthreats,” Wall Street Journal, February 6, 2016, accessed February 15, 2017, https://www.wsj.com/articles/protecting-u-s-innovation-from- cyberthreats-1455012003.
  • 5. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 5 Figure 1: Survey Respondents by Generation Source: Aite Group survey of 1,095 U.S. consumers, January 2017. In terms of digital channel use, 55% of respondents use both online and mobile banking, 35% use online banking only, and 10% use mobile banking only (Figure 2). Figure 2: Type of Digital Banking Services Used Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Millennials 35% Generation X 26% Baby boomers 32% Seniors 7% Respondents' Generation (N=1,095 U.S. digital bankers) Online only 35% Mobile only 10% Both mobile and online 55% Type of Digital Banking Services Used (N=1,095 U.S. digital bankers)
  • 6. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 6 THE MARKET DRIVERS With more than 6 billion data records compromised since 2013, the organized crime rings behind the majority of financial fraud have a vast amount of data at their disposal. Criminals are making ample use of this data, which is manifest in the rising ATO and application fraud losses that are hitting FIs and merchants alike. 3 Table A highlights a handful of the notable data breaches announced in 2016. Table A: Notable 2016 Data Breaches Breached entity Date announced Data compromised Yahoo! December and September 2016 1.5 billion records including username, password, phone number, date of birth, and security questions and answers AdultFriendFinder.com November 2016 412 million records including username, password, and email address Weebly October 2016 43.5 million records, including username, password, email address, and IP address VK.com June 2016 171 million records, including full name, username, clear text password, email address, and phone number 21st Century Oncology March 2016 2.2 million patient records, including name, social security number, diagnosis, and insurance information Source: Aite Group At the same time that the threat environment is escalating rapidly, FIs and merchants struggle to find the right balance between security and the user experience. Consumers’ expectations for digital interactions are being set by the elegant and largely friction-free user experiences provided by the likes of Amazon, Apple, and Uber. The ability to provide a satisfying and meaningful customer experience is increasingly a key competitive differentiator. When Aite Group asked consumers about their key priorities for their FI’s online banking service, the responses show that ease of use is the most important consideration on average. Robust security and fraud prevention is also deemed to be very important by the majority of respondents; seniors give this equal weight with ease of use, with 76% of seniors saying both are very important (Figure 3). Seventy percent of millennials believe interactive transactional security to be a very important component in their online banking experience, while this was less critical for the older age groups. Robust transactional capability in online banking came in last place relative to the importance of ease of use and fraud prevention; 61% of millennials say this is very important, while roughly one in two baby boomers, seniors, and Gen Xers believe it to be very important. 3. See Aite Group’s report EMV: Issuance Trajectory and Impact on Account Takeover and CNP, May 2016.
  • 7. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 7 Figure 3: Consumers’ Priorities for Online Banking Capabilities Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Table B details some of the key trends shaping FI and merchant decisions around how to evolve their fraud prevention and authentication strategies. Table B: Market Trends and Implications Market trends Market implications Usernames and passwords have outlived their useful life. The combination of the data breaches and consumers’ unfortunate tendency to use the same handful of username/password combinations across all of their online relationships have relegated the credential pair to a database look-up mechanism, with little security value. Customer experience is a competitive differentiator. FIs and merchants are working to remove friction from the customer experience in order to meet the rising bar of customer expectations for the digital user experience. The threat landscape is evolving rapidly. Criminals are adjusting their tactics rapidly; it’s difficult for FIs to be equally nimble and keep pace. There is an increasing ubiquity and use of mobile devices. The increasing prevalence of smartphones and tablets provides new opportunities to deploy stronger authentication mechanisms in a customer-friendly manner. In addition, inputting usernames and passwords in a mobile device is a clunky user experience, so many consumers willingly embrace biometrics and other technologies that are both easier and more secure. Source: Aite Group 75% 70% 70% 61% 72% 65% 53% 49% 77% 70% 61% 51% 76% 76% 54% 50% Ease of use Behind the scenes fraud prevention and security Interactive fraud prevention and security (i.e., security that requires the customer to take additional steps to prove he or she is the genuine customer) Robust transactional capability Q. How important are each of the following to you when you're considering using your financial institution's online banking services? - Very important - Millennials (n=389) Generation X (n=284) Baby boomers (n=347) Seniors (n=75)
  • 8. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 8 PASSWORDS: EASY BUT INEFFECTIVE Consumers are generally quite comfortable using passwords to access their online bank account, with very little difference in attitude across the generations (Figure 4). Part of this comfort level can be attributed to habituation; the username/password combination has been around since the inception of online commerce, and consumers are quite well trained in their use. Figure 4: Consumers’ Attitudes Toward Passwords Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Unfortunately, another key reason why consumers are so comfortable with using passwords is because they are doing so poorly. The majority of consumers are only using a handful of username/password combinations across their online relationships. Millennials are the worst offenders, with 77% using between just one and five unique passwords across all of their online relationships. Sixty-six percent of Gen Xers and 57% of seniors use between one and five passwords across all of their online relationships. While the majority of baby boomers also use between one and five passwords across all of their online relationships, 32% of baby boomers use a different password for each of their online accounts (Figure 5). Password managers, which enable end users to organize and store unique, complex passwords can help. These solutions face their own challenges, however, as criminals have recognized that they hold the proverbial keys to the kingdom. LastPass was successfully breached in 2015, and a recent report shows that a number of the other password managers have their own security vulnerabilities. The key lesson is that when it comes to security, there is never a silver bullet. 4 4. Roi Perez, “German Researchers Find Flaws in Nine Major Password Managers, SC Magazine, March 1, 2017, accessed March 6, 2017, https://www.scmagazineuk.com/german-researchers-find-flaws-in- nine-major-password-managers/article/640998/. 84% 77% 81% 80% 15% 22% 18% 13% 7% Millennials (n=389) Generation X (n=284) Baby boomers (n=347) Seniors (n=75) Q. Which of the following statements best describes your attitude toward using passwords to access your accounts with your bank or other financial institution? (N=1,095 U.S. digital bankers) Passwords are very difficult to use Passwords are kind of a pain Passwords are fine to use
  • 9. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 9 Figure 5: Number of Unique Passwords Used by Consumers Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Part of the reason consumers are lazy about passwords is that it’s hard to remember a different password for each site, and it’s frustrating when a forgotten password prevents or delays access to a website and its services. As shown in Figure 6, 40% to 45% of consumers report feeling extremely or very frustrated when they can’t get into their banking website due to a forgotten password, with nearly one in three feeling that level of frustration when they can’t login to an e- commerce or media site. Figure 6: Consumers’ Response to Forgotten Passwords Source: Aite Group survey of 1,095 U.S. consumers, January 2017. 14% 8% 8% 13% 25% 17% 10% 9% 38% 41% 33% 35% 10% 12% 17% 17% 13% 22% 32% 25% Millennials Generation X Baby boomers Seniors Q. How many unique passwords do you use for your online accounts? (N=1,095 U.S. digital bankers) 1 password 2 passwords 3 to 5 passwords More than 6 passwords A different password for every account 45% 31% 35% 43% 31% 32% 40% 32% 27% 40% 28% 21% Banking site E-commerce site (e.g., Amazon or Macy's) Media site (e.g., Hulu or Netflix) Q. Which of the following best describes how you feel when you've forgotten the password to the following types of sites? Extremely frustrated or very frustrated Millennials (n=389) Generation X (n=284) Baby boomers (n=347) Seniors (n=75)
  • 10. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 10 ONLINE AND MOBILE AUTHENTICATION METHODS The username/password combination became the industry standard for online user identification more than two decades ago. Criminals have long since proven adept at compromising this capability, yet it still remains the predominant initial means of user identification. The increasing ubiquity of mobile devices, however, provides new opportunities to provide superior authentication capabilities with minimal impact to the user experience. Within the mobile channel, replacing the need to enter a username/password with a biometric actually provides the opportunity to increase security while improving the customer experience. A number of large FIs, including Bank of America, U.S. Bank, Chase, and USAA, have already given their customers the choice of logging into the mobile app with their fingerprint. When asked whether they would be willing to switch to an alternative identification method other than a password, there was a clear correlation between consumers’ openness to change and their age. Forty-eight percent of millennials indicate that they are very willing to switch methods, with another 47% somewhat willing to change. In contrast, only 16% of seniors are very willing to learn new methods (Figure 7). Figure 7: Consumers’ Openness to Alternative Identification Methods Source: Aite Group survey of 1,095 U.S. consumers, January 2017. 48% 40% 29% 16% 47% 42% 53% 48% 4% 9% 9% 11% 10% 9% 25% Millennials Generation X Baby boomers Seniors Q. How willing would you be to switch to another identification method other than passwords to access your accounts with your bank or other financial institution? (N=1,095 U.S. digital bankers) Very willing Somewhat willing Not at all willing Don’t know
  • 11. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 11 A number of viable alternatives to passwords are already in use, as described in Table C. Table C: Authentication Methods Authentication type Description Pros Cons Device fingerprint (or device identification) Device identification technology examines a combination of identifiable hardware and software attributes associated with a computer or mobile device. Transparent to the end user Can be used to provide recognition of devices associated with fraudulent activity as well as ongoing recognition of devices with trusted reputations While highly reliable in the mobile app environment, the device fingerprint is less permanent in the browser environment. Device location It uses sensors native to the mobile device to identify the device’s location. Transparent to the end user Reliable risk indicator, particularly when used in conjunction with other layers of protection Many businesses are concerned about a “big brother” stigma and enable this on an opt-in basis. Eye vein biometric It uses the device’s video recorder to capture the end user’s eyes, then applies pattern recognition to authenticate the eye veins. Very accurate, low level of false positives and false negatives It’s less user-friendly than facial recognition or fingerprint, due to the need to capture a close- up of the eyes. Facial recognition It uses the device’s video recorder to capture the end user’s face and typically requires user to blink to perform liveliness check. Works well with camera- enabled devices Good level of security if used in conjunction with device fingerprint Some consumers will not want to enable their video. Liveliness tests are susceptible to spoofing. Fingerprint biometric It leverages a device’s embedded fingerprint reader; remote channel use cases are currently focused on the mobile channel. Decent level of security if used in conjunction with device fingerprint, certainly superior to usernames and passwords Easy to use The sensors in mobile devices are cheap and lack liveliness tests. It is hard to get a good read on some consumers, particularly seniors or manual laborers, as fingerprints erode over time. Apple permits nine fingerprints to be associated with the device but doesn’t tell the
  • 12. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 12 Authentication type Description Pros Cons FI whose fingerprint is in use. Knowledge- based authentication (KBA) KBA questions provide an additional layer of identity verification by establishing that the end user knows the answer to one or more personal questions. Works with all device types and is understood by consumers Due to data breaches and consumers’ penchant for oversharing on social media, criminals have easy access to much of the data upon which the KBA questions are based. Mobile network operator (MNO) data Through direct, real-time interfaces with MNOs, this technology uses the same device hardware- based network authentication as MNOs to secure its own services. This enables positive verification that the device belongs to the person authorized on the mobile account as well as to provide notification if the device is lost or stolen. Transparent to the end user Highly effective, given the reliance on source data from the MNO Fraudsters have started perpetrating ATO attacks at the MNO level. One-time password (OTP) Sending a one-time password to a mobile device provides the ability to verify that the user has that device in his or her possession. Used in an increasing number of use cases and well-understood by many consumers Secure when delivered by mobile app push to authenticate a transaction taking place online or in the contact center If the transaction is performed in the mobile channel, then the OTP has limited value, since it does not provide a second factor of authentication. While OTP delivery via mobile app push is quite secure, SMS-based OTP delivery is vulnerable to SIM-swaps and malware- based attacks. Two-way text This is an SMS message sent to the consumer, to which they can reply, either approving or denying the transaction. Ubiquitous—works for consumers with all types of mobile phones Provides an opportunity for a quick and easy dialogue between the business and its customer SMS is susceptible to spoof, and delivery is not as certain as it is in the mobile app environment. Voice recognition It creates a unique biometric driven by the Minimally intrusive on the user experience and can be completely Technology is still subject to false positives.
  • 13. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 13 Authentication type Description Pros Cons characteristics of the end user’s voice. transparent if passive biometrics are used Applicable to a wide range of devices Source: Aite Group When Aite Group surveyed consumers about the ease of use and effectiveness of various forms of authentication (Figure 8), a few key learnings emerged:  Familiarity equates to ease of use for many consumers; over 50% of all consumers deem username and password very easy to use (since most are using the same handful of usernames and passwords across all of their online relationships). Fingerprint biometrics come in second for ease of use, although seniors give it significantly lower marks than millennials, likely due to the fact that seniors tend to have lower read rates than younger generations.  Consumers don’t understand many of these concepts, even when provided with a brief description. Familiarity has a clear correlation with age—seniors are most likely to respond “Don’t know” when asked about an authentication method, while millennials show the greatest degree of familiarity with the alternative authentication methods presented. The fact that device identification and device location—technologies that are completely transparent to the consumer—received relatively low marks for ease of use shows that these concepts are not well understood.  While the millennials are stereotyped as being the “selfie” generation, only 41% believe that using the selfie as an authenticator is very easy. Username/password, the fingerprint biometric, device identification, and KBA all came in higher in perceived ease of use for this group. This could indicate that what works for social media does not easily translate to transactional activity without a concerted effort at education.
  • 14. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 14 Figure 8: Perceived Ease of Use of Authentication Methods Source: Aite Group survey of 1,095 U.S. consumers, January 2017. When asked about their perceptions of the effectiveness of each of these technologies, consumers clearly believe that the fingerprint and the eye biometrics have the edge (Figure 9). Opinions regarding the effectiveness of username/password were mixed; while 43% of millennials deem username/password to be very effective, only 16% of seniors share this opinion. Seniors are also more skeptical of KBA—while one in three millennials believe KBA to be very effective, that opinion is shared by just 13% of seniors (potentially meaning this group reads the news a bit more and is more aware of the vulnerabilities of both the password and KBA in this era of data breaches). While device identification ranked fairly low in terms of perceived effectiveness, many of the respondents also indicated that they didn’t have a good 66% 59% 58% 56% 55% 48% 49% 36% 49% 45% 44% 43% 45% 31% 31% 25% 41% 38% 37% 25% 41% 34% 30% 17% 37% 35% 35% 24% 38% 33% 35% 28% 25% 31% 35% 39% 31% 31% 30% 37% 37% 38% 41% 41% 36% 43% 35% 25% 32% 30% 33% 40% 35% 39% 37% 37% 34% 33% 32% 28% 34% 38% 32% 31% 5% 8% 6% 5% 9% 8% 9% 8% 10% 10% 10% 8% 13% 13% 14% 25% 15% 14% 15% 15% 14% 12% 12% 15% 16% 16% 15% 15% 18% 15% 17% 11% 3% 2% 2% 0% 3% 4% 3% 4% 6% 6% 5% 3% 5% 4% 5% 4% 8% 7% 6% 4% 6% 4% 5% 5% 10% 9% 16% 4% 4% 8% 4% 10% 17% 20% 5% 12% 10% 17% 5% 11% 16% 27% 5% 10% 12% 29% 4% 11% 11% 25% Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby Boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Username andpassword Fingerprint biometric Knowledge- based authentication Device identification Facial recognition Device locationEyebiometric Voice recognition Q. Thinking about the same identification methods, how difficult or easy do you think each is to use? (N=1,095 U.S. digital bankers) Very easy Somewhat easy Somewhat difficult Very difficult Don’t know
  • 15. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 15 understanding of the technology, which makes sense since it operates entirely behind the scenes. Figure 9: Perceived Effectiveness of Authentication Methods Source: Aite Group survey of 1,095 U.S. consumers, January 2017. When asked about willingness to engage with specific authentication methods at the time of logging into an account, two-way text has a slight edge as the preferred method of interaction among all age groups, followed by mobile app push (Figure 10). SMS messages and mobile app 51% 49% 50% 41% 42% 41% 43% 43% 43% 34% 26% 16% 33% 29% 23% 13% 36% 35% 32% 21% 35% 24% 18% 5% 31% 22% 21% 9% 28% 15% 9% 34% 26% 26% 27% 34% 28% 24% 15% 37% 43% 42% 40% 41% 37% 35% 36% 35% 29% 27% 32% 36% 38% 28% 40% 31% 31% 29% 25% 32% 29% 21% 21% 9% 13% 10% 13% 12% 13% 13% 11% 16% 21% 29% 36% 21% 25% 33% 29% 18% 19% 22% 11% 18% 21% 30% 17% 21% 25% 25% 29% 22% 26% 29% 27% 4% 3% 4% 4% 5% 6% 5% 5% 1% 1% 3% 5% 4% 7% 7% 12% 6% 7% 6% 8% 6% 8% 10% 9% 11% 11% 9% 12% 13% 17% 23% 23% 9% 10% 15% 7% 12% 15% 27% 3% 3% 3% 9% 5% 10% 14% 28% 5% 10% 14% 28% 6% 12% 17% 24% 5% 13% 19% 29% Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Fingerprint biometricEyebiometric Usernameand password Knowledge- based authentication Facial recognitionvia thedevice's camera Device identification Voice recognition Device location Q. How effective do you think each of the following is at accurately identifying you and preventing others from accessing your accounts? (N=1,095 U.S. digital bankers) Very effective Effective Somewhat effective Not at all effective Don’t know
  • 16. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 16 push are already used by many FIs as a way to deliver alerts. This can serve as a path to habituation, that is, a way to train consumers to engage with these capabilities not only for notification of events, but for authentication as well. Figure 10: Consumers’ Willingness to Engage With Various Authentication Methods Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Consumers can be bought, and there is plenty of precedent that shows that incentives can go a long way toward influencing customer behavior. A prime example of this is the lukewarm reception that consumers have given open-loop mobile wallets such as Apple Pay and Android Pay. Fewer than 10% of U.S. banked consumers regularly use these open-loop mobile wallets, which provide little incentive for consumers to change their behavior aside from a “cool factor.” In contrast, Starbucks now sees over 25% of its total U.S. payment volume coming in through its mobile app, which provides free caffeinated beverages in exchange for regular use. 5 While 51% of consumers say that they would be willing to proactively sign up for a variety of stepped-up authentication methods without any form of monetary incentive, an incremental 24% of consumers say that they would be willing to do so if the bank offers a cash bonus of US$10 to US$25 (Figure 11). 5. Rian Boden, “Mobile Payments Account for 25% of all U.S. Starbucks Transactions,” NFC World, November 8, 2016, accessed March 1, 2017, https://www.nfcworld.com/2016/11/08/348311/mobile- payments-account-25-us-starbucks-transactions/ 30% 23% 19% 24% 28% 19% 11% 17% 22% 14% 12% 12% 23% 17% 13% 13% 36% 32% 31% 16% 35% 29% 24% 9% 28% 27% 23% 17% 32% 28% 25% 21% 25% 31% 25% 24% 27% 34% 29% 23% 28% 35% 38% 33% 28% 29% 32% 29% 9% 14% 26% 36% 10% 19% 36% 51% 22% 24% 27% 37% 17% 25% 30% 36% Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors Millennials Generation X Baby boomers Seniors 2-waytextMobileapppushVoicerecognition Facial recognitionvia thedevice's camera Q. How interested would you be to sign up for the following verification methods? (N=1,095 U.S. digtial bankers) Very interested Interested Somewhat interested Not at all interested
  • 17. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 17 Figure 11: Incentives’ Ability to Sway Consumer Behavior Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Millennials are the most receptive to a new authentication experience, with 62% of millennials willing to engage with new authentication methods without the incentive, while seniors, at one in three, are the least receptive. The impact of the cash incentive on adoption is roughly equal across the generations, with the cash incentive increasing senior adoption by 17% and 25% for millennials (Figure 12). Figure 12: Incentives’ Ability to Sway Consumer Behavior by Generation Source: Aite Group survey of 1,095 U.S. consumers, January 2017. Interested without incentive 51% Interested with incentive at $10 15% Interested with incentive at $25 9% Not interested with or without incentive 25% Change in Interest Level Due to Incentives (N=1,095 U.S. mobile or online bankers) 62% 53% 40% 33% 15% 15% 15% 10% 10% 8% 9% 7% 13% 24% 36% 50% Millennials Generation X Baby boomers Seniors Change in interest level due to incentives by generation (N=1,095 U.S. mobile or online bankers) Interested without incentive Interested with incentive at $10 Interested with incentive at $25 Not interested with or without incentive
  • 18. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 18 CONCLUSION The need for FIs and merchants to move beyond a password for customer authentication is clear. Here are a few recommendations for executives as they are plotting their course.  Start with the mobile channel. The mobile environment lends itself very nicely to expanding authentication methods, since keying the username/password into the tiny mobile keyboard is already a suboptimal user experience. Transitioning authentication to a biometric increases security while concurrently improving the customer experience.  Enable multiple forms of authentication. A layered approach to authentication has long been a best practice—starting with technologies that are transparent to the end user, then selectively introducing stepped-up authentication measures commensurate with the context and risk of the transaction. Enabling multiple forms of stepped-up authentication provides flexibility—if criminals begin to exploit a vulnerability in a particular authenticator, then the FI or merchant can shift nimbly to another method. This approach also has the potential to give consumers the ability to choose the form of authentication with which they are most comfortable. The data shows that what works for millennials may not be the best option for baby boomers or seniors.  Leverage the complementary nature of notification and authentication strategies. Consumers are becoming accustomed to receiving alerts and notifications from their FI via SMS and the mobile app. As that behavior pattern takes hold, it is a relatively small step to then move to using those channels for authentication as well.  Tailor education to customers’ demographic group. The data clearly shows widely differing comfort and understanding of the various forms of authentication. FIs and merchants need to take this into consideration as they are tailoring their messaging and educational efforts.  Consider providing incentives to shift behavior. Changing ingrained habits is always difficult, and the use of passwords is certainly a comfortable habit for most consumers. As Starbucks has shown with the success of its mobile app, however, consumers respond to incentives, and the research shows that millennials will be particularly responsive.
  • 19. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 19 RELATED AITE GROUP RESEARCH Top 10 Trends in Retail Banking & Payments, 2017: Data Analytics Differentiate, January 2017. Global Security Engagement ScorecardTM , November 2016. Biometrics: The Time Has Come, October, 2016. 2016 Global Consumer Card Fraud: Where Card Fraud Is Coming From, July 2016. EMV: Issuance Trajectory and Impact on Account Takeover and CNP, May 2016.
  • 20. Moving Beyond the Password: Consumers’ Views on Authentication MARCH 2017 © 2017 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. 101 Arch Street, Suite 501, Boston, MA 02110 • Tel +1.617.338.6050 • Fax +1.617.338.6078 • info@aitegroup.com • www.aitegroup.com 20 ABOUT AITE GROUP Aite Group is a global research and advisory firm delivering comprehensive, actionable advice on business, technology, and regulatory issues and their impact on the financial services industry. With expertise in banking, payments, insurance, wealth management, and the capital markets, we guide financial institutions, technology providers, and consulting firms worldwide. We partner with our clients, revealing their blind spots and delivering insights to make their businesses smarter and stronger. Visit us on the web and connect with us on Twitter and LinkedIn. AUTHOR INFORMATION Julie Conroy +1.617.398.5045 jconroy@aitegroup.com Research Design and Data: Sarah Fitzsimmons +1.617.398.5039 sfitzsimmons@aitegroup.com CONTACT For more information on research and consulting services, please contact: Aite Group Sales +1.617.338.6050 sales@aitegroup.com For all press and conference inquiries, please contact: Aite Group PR +1.617.398.5048 pr@aitegroup.com For all other inquiries, please contact: info@aitegroup.com