VoiceTrust Whitepaper An Introduction to Voice Biometrics TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 Table of Contents Introduction: The State of Fraud and Identity Theft.............................................. 3 What is Voice Biometrics?.................................................................................... 3 How Security is Compromised Today................................................................... 4 Security Risks of Various Authentication Methods............................................... 6 The Three Biggest Adopters of Voice Biometrics................................................. 7 Solutions for Fraud Prevention and Strong Authentication................................... 8 The Benefits of Voice Biometrics........................................................................ 10 About VoiceTrust................................................................................................ 12 www.voicetrust.com www.voicetrust.com Page 2 Page 2 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 Introduction: The State of Fraud and Identity Theft Identity theft and fraud are on the rise, with at least 44 million personal records compromised around the world in 2012. Over $50 billion is lost each year because of identity theft, with banks, insurance companies, and healthcare providers being the most heavily affected industries. Organizations still use passwords, security questions, and PINs to authenticate their customers. This approach offers weak protection against fraudsters that use stolen personal information to gain unauthorized access to accounts. Voice biometrics is being used to counter this threat with strong authentication to combat fraud and makes identity verification more convenient for customers. This whitepaper takes a closer look at voice biometrics, how it is being used across various industries, and why it offers more secure identity verification than knowledge-based authentication approaches. What is Voice Biometrics? Voice biometrics verifies a person’s identity by analyzing hundreds of voice characteristics, which are more unique to an individual than a fingerprint. It compares a person’s voice with their voiceprint, a previously recorded representation of their voice, to confirm or deny their identity. Voice authentication is commonly deployed as an additional security layer, especially for organizations targeted by fraud rings including banks, insurance companies, and healthcare providers. It provides stronger authentication than a knowledge-based approach by verifying people based on who they are, as opposed to what they know. How Widespread is It? Gartner estimates that there were at least 150 million voice verifications in 2012 in the commercial space, with even more across government and intelligence agencies. www.voicetrust.com www.voicetrust.com Page 3 Page 3 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 How Security is Compromised Today Fraudsters are becoming more sophisticated and multiple reports from security providers including Verizon, IBM, and Symantec show an increase in data breaches that compromise millions of personal records each year. The section below outlines the most common ways sensitive information is stolen by organized criminal rings to be used for identity theft. Data Breaches A recent Verizon report confirmed at least 44 million compromised records and 621 data breaches worldwide in 2012. A variety of techniques such as hacking and malware are used to break into databases and steal personal information for identity fraud. Recent high-profile breaches include LivingSocial, LinkedIn, and EverNote where millions of names, email addresses, and passwords were exposed. The US accounts for almost 50% of the world’s security breaches followed by the UK at 8%. Financial organizations comprise an alarming 37% of all breaches carried out. Sharing Credentials Over 50% of respondents admit they have shared passwords or PINs with family members, friends, or work colleagues. For example, family members commonly share credit cards to carry out financial transactions. Work colleagues share credentials to access shared files or specific accounts. Credential sharing compromises account security and allows any malicious user in possession of these knowledge factors a 100% success rate of conducting an attack. www.voicetrust.com www.voicetrust.com Page 4 Page 4 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 Phishing Phishing tricks users into revealing personal information such as usernames, passwords, and PINs. It usually works by sending the victim an email masquerading as a trustworthy company or individual to lure them into providing information. Gartner estimates that 3% of targets fall victim to phishing attacks; the most widely used social tactic by a wide margin. Global losses from phishing are estimated at $1.5B in 2012. Vishing Vishing involves a fraudster calling a person on the phone to deceive them into providing private information to be used in identity theft. It is a more sophisticated approach that commonly uses a spoofed caller ID purporting to be from a misrepresented organization. It has a lower success rate than phishing or brute-force attacks, but is often used when other methods are not successful. Brute Force Most authentication methods today rely on knowledge factors such as PINs, usernames, and passwords to verify your identity. A 2012 study by DataGenetics examined over 3 million passwords and revealed the security flaws with knowledge-based authentication (KBA). More than 10% of the passwords were ‘1234’ and people commonly used their birthdays as their 4-digit PINs. This makes it too easy for malicious individuals to compromise these accounts in the call center or online. www.voicetrust.com www.voicetrust.com Page 5 Page 5 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 Security Risks of Various Authentication Methods Biometrics such as voice, iris, fingerprint, and face offer the strongest form of identity assurance and are superior to knowledge-based authentication approaches. The table below provides a comparison of security vulnerabilities against fraud for voice authentication, physical tokens, and knowledge factors such as security questions. The ratings below correspond to how often vulnerabilities in each authentication method are compromised: High: More than 25% of the time Medium: Between 5%-25% Low: Less than 5% Voice Biometrics PIN & Password Security Questions Physical Tokens Data Breach / Theft Low Medium Medium High Credential Sharing Low High High Medium Brute Force Low High High Low Social Engineering None Medium High None Hacking Low Medium Medium Low / Medium Phishing Low Medium Medium Low Vishing None High High Low Source: Opus Research Voice Biometrics Provides Stronger Authentication Voice biometrics clearly provides stronger authentication than PINs, passwords, and security questions as illustrated in the table above. It integrates as an additional security factor for fraud prevention and risk management, or can be used as a standalone solution depending on requirements. www.voicetrust.com www.voicetrust.com Page 6 Page 6 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 The 3 Biggest Adopters of Voice Biometrics Financial Services Banks and insurance companies are the most heavily hit by identity theft and lose billions of dollars each year as a result. According to a Verizon report, 37% of all breaches in 2012 affected financial organizations. Three quarters of executives at 19 of the top 40 U.S. financial institutions say that organized criminal rings are the primary fraud threat in their call centers. They are using voice authentication to combat fraud, protect customer and data privacy, and provide faster service in the call center while maintaining higher security and risk management standards. Healthcare There were 17 million breaches of patient information in 2011 according to the Department of Health and Human Services. The economic consequences of medical identity theft was over $40B in the US alone. High-profile breaches including almost one million compromised personal health records at the Utah Department of Health in 2012 continue to make mainstream headlines. Healthcare providers use voice authentication to protect private health information and ensure compliance with regulations such as HIPAA. Healthcare providers are looking to secure access to electronic health records with voice biometrics. Physicians and patients are able to remotely access medical records with their mobile device or computer, using their voice as a password for a more secure and convenient process. Government Voice authentication is being explored by governments to prevent identity theft and corruption in payment programs such as pension funds and social assistance programs which has the potential to save billions of dollars worldwide. It saves citizens from a visit to a government kiosk each time they need to prove their identity because they can authenticate from their phone. This lowers lineups and improves back-office efficiency, protects citizens from identity theft, and make governments more cost-effective. www.voicetrust.com www.voicetrust.com Page 7 Page 7 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 VoiceTrust Solutions for Fraud Prevention and Stronger Authentication VoiceTrust’s voice authentication solutions offer a stronger and more convenient way to verify user identity and is being deployed in an increasing number of scenarios across industries. The following overview provides some of the more mainstream applications today. Call Center Authentication Voice authentication helps call centers prevent fraud and verify the identity of their customers 20 seconds faster on average according to Gartner. US call centers stand to save billions of dollars with widespread adoption, considering they spend $12.4B per year on customer verification alone. Almost 75% of financial call centers were hit by organized fraud rings in 2013 according to a recent Aite Group Research report. The added layer of security that voice authentication provides is one of the most effective ways to combat this problem. Customers appreciate faster service and not having to remember PINs and passwords, helping with customer experience metrics such as Net Promoter Score. Financial Transactions and Payments Voice authentication makes remote financial transactions and fund transfers more secure and immune to identity theft. The payment industry loses more than $11B because of fraud each year and affects issuers, merchants, and governments. Voice biometrics makes the payment process more convenient to buyers who no longer have to remember multiple passwords, PINs, and security questions for each transaction. High-risk payments and transfers are protected with multiple authentication factors including voice and mobile phone tokens to prevent fraud. www.voicetrust.com www.voicetrust.com Page 8 Page 8 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 Automated Password Resets IT helpdesks use voice authentication to automate employee and customer password resets which comprise up to 30% of support ticket volume. This provides significant cost savings considering each manual reset averages $5-$15. Helpdesks are one of the first adopters of voice authentication technologies and often see an ROI of less than a year. Voice authentication can also be used to reset passwords for online account logins such as Twitter or Google Business Apps. In this scenario the user receives an automated phone call and uses their voice to verify their identity. Voice fits well as part of the multi-factor authentication strategies that are becoming popular with online service providers. Mobile Application Security Three billion people will be using biometrics on their mobile devices by 2018, generating more than $8 billion in revenue. Voice is a more accurate form of identity verification than the fingerprint scans in devices today and is a natural fit for mobile devices. Voice authentication provides an additional layer of security for logging into mobile, web, and desktop applications. It overcomes the weakness associated with passwords and saves users the hassle of typing long passwords and multiple security questions into their device. The financial sector is an early adopter in this area with various high-profile projects underway to protect access to consumer and business banking applications with voice. www.voicetrust.com www.voicetrust.com Page 9 Page 9 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 The Benefits of Voice Biometrics Voice biometrics authentication provides higher security and user convenience than other identity verification methods, especially passwords and PINs. The advantages provided in this section highlight why it is becoming a popular form of authentication. Stronger Identity Verification and Fraud Prevention Voice biometrics has successful verification rates approaching 100% and has proven to be effective in industries where security is paramount such as banks and insurance providers. Your Voice Cannot Be Stolen or Compromised A voiceprint is a representation of your voice characteristics and is stored in database file as a hashed string of numbers and characters. A compromised voiceprint cannot be used for authentication, has no value to hackers, and cannot be used to reverse-engineer someone’s voice. This makes it immune to data breaches and theft of credentials that compromise millions of identity records each year. Users Find it Convenient Surveys indicate that consumers find voice biometrics secure and convenient to use. This is no surprise considering consumers are fed up with having to remember multiple PINs, passwords, and security questions. Layered Security Voice authentication fits into your existing security approach either as a stand-alone solution or as an additional layer of security. This makes it suitable for multi-factor authentication which is gaining rapid adoption around the world. www.voicetrust.com www.voicetrust.com Page 10 Page 10 TopIntroduction An 10 Call Center to Voice TrendsBiometrics for 2014 Remote Authentication Voice naturally lends itself to remote authentication scenarios involving a mobile device or computer. No additional hardware is required unlike other biometric methods such as iris scans. The proliferation of mobile phones means billions of people around the world can be verified using this method. Flexible Deployment Voice verification can be deployed on-premise or in a variety of cloud settings (private, public, hybrid) to meet the security requirements of any organization. Every aspect of the authentication experience is configurable to achieve the perfect balance between security and convenience. Immune to Voice Recording Voice authentication prevents ‘replay attacks’ that use a voice recording to gain unauthorized access. The system can ask for random words and numbers to be provided in a different order to prevent fraudsters from successfully using a recording. Works In Any Language Voice authentication verifies a user’s identity within seconds and works regardless of language or accent. This makes it readily available to people around the world and has the capacity to make the world more secure for billions of people. www.voicetrust.com www.voicetrust.com Page 11 Page 11 Contact Us Top 10 Call Center Trends for 2014 About VoiceTrust We provide voice biometrics solutions that prevent fraud, eliminate identity theft, and make application logins more secure. Fortune Global 500 clients including banks, insurance companies, call centers, and enterprises rely on our solutions to verify the identity of millions of users. Founded in 2000, the privately-owned company is headquartered in Toronto, Canada with additional offices in the USA, Germany, and UAE. For the latest insights on security and user authentication please follow @VoiceTrust on Twitter, or visit www.voicetrust.com. VoiceTrust Offices Corporate HQ - Toronto, ON Canada - Montreal, QC USA - Princeton, NJ Phone: +1 (416) 901-1333 Email: info@voicetrust.com Phone: +1 (514) 587-2525 Email: info@voicetrust.com Phone: +1 (609) 751-9223 Email: info@voicetrust.com Germany - Munich UAE - Dubai Phone: +49 (89) 127 16 0 Email: info@voicetrust.com Phone: +971 4 445 8238 Email: info@voicetrust.com www.voicetrust.com www.voicetrust.com Page 12 Page 12