Industry Insights

Blog, Security

What Threats You Need to Consider with Voice-Based Tools

by | Friday, October 22nd, 2021

Authentication is one of the most important topics on the table for discussion this year, particularly in regards to how the need for secure data access has been increased considerably during the COVID-19 crisis. How can you make sure that your data is being accessed in a safe and secure manner while also verifying the identity of whoever accesses it? Voice-based authentication might be one option. 

Here are some of the variables that must be taken into consideration concerning voice-based authentication.

First and Foremost, How Does Voice Authentication Work?

Authentication measures require the user to provide proof of identity. If the proof matches what the system compares it to, then the user is granted access. Voice authentication uses the user’s voice print of a specific phrase to keep access to an account secure. The system then compares that spoken phrase to what it has stored.

If the passphrase was “The rain in Spain falls mainly over the lazy dog,” the system would check for the correct phrase, as well as the tones and inflections in the user’s voice. As such, voice recognition software would classify as “something you are” in terms of multi-factor authentication, right alongside staples like retinal scanning, facial recognition, and palm scans.

How Secure is Voice Authentication?

Just like other authentication measures, there are already many stories about how voice recognition can be fooled. Hackers have already been able to fool voice authentication with recorded segments of the victim’s voice, and they have hidden malicious commands in white noise to gain control over voice-activated devices.

That said, it’s important to mention that any form of identity authentication is not going to be as effective on its own as if you were to use it alongside other measures. Voice authentication is being developed with a couple of built-in features that are meant to minimize fraud. First, there is liveness detection, a measure that can differentiate between a recorded snippet and a real live voice. The second is continuous authentication, a process that constantly checks whether or not the person accessing the device is who they say they are.

Best Practices Concerning Voice Authentication

We have already touched on a couple of these, but we wanted to emphasize the importance of these best practices:

  • Multi-factor authentication: MFA is critical to the security of any system, and the more proof you need to provide a system to guarantee security, the less likely it is to allow unauthorized access. For example, you can pair a PIN or password/passphrase with voice recognition or some other authentication measure.
  • Secure Storage: Make sure that all saved records of your authentication data are extremely secure, including biometrics. MFA can be fooled if you don’t, and the whole system will crumble, bringing your hopes and dreams for a secure network along with it.
  • Obtain Consent: You will also need to provide proof that you have your users’ permission to use biometric data as an authentication measure (for privacy and legal reasons).

No matter how you choose to secure your business, Compudata can help. To learn more, reach out to us at 1-855-405-8889.

A Glimpse Into What Compliance Looks Like for Businesses

It’s easy to see all the reasons why you should make data regulations and compliance a priority. After all, you want to ensure you don’t violate the trust and security of your customers, as well as the integrity of your operations. If you make even one mistake, it...

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Remote Work Is Great, but There Are Some Pitfalls

Do you have employees working remotely? If you do, the real question is, are you doing everything you can to keep them productive and secure? Remote work is awesome, but it comes with its fair share of risks. Today, we get into how to competently confront them. Remote...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...

Let’s Take the Lid Off of CAPTCHA

We've officially reached the point where humans have to prove they're, well, human just to access websites. One of the most common ways to do this? CAPTCHA. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It might sound...

Automation Isn’t Always the Best Business Option

Automation makes sense from an operations standpoint, and people see this despite the many who advocate for scaling back to save jobs. For every task that can be completed, however, less than half can be automated. When you consider all the tasks that a human might be...

More Reading from Industry Insights:

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...