Biometric authentication, the good, the bad, and the ugly

The pros and cons of using biometrics for authentication

Biometric authentication

It seems like biometrics are everywhere: fingerprints, facial recognition, voice recognition, and more. But are biometrics really the cure for secure authentication? Like all technologies, this one has pros and cons. In this topic, we’ll examine the good, the bad, and the ugly side of biometrics for authentication.

The good part about biometrics for security

There’s a reason biometrics are increasingly popular: they’re harder to fake. Authentication has evolved. It started with what you know, a username and password, for instance. But it’s easy to steal or trick people into giving up the information they know. So, authentication techniques moved to what you have: a cell phone in hand or a card key. This, combined with what you know, made users more secure.

But not secure enough. Cyber criminals could still obtain or fake the devices users had. What you are, demonstrated through biometrics, is the next stage for authentication. And it’s true, it’s much harder to fake someone’s voice, fingerprint, iris, etc.

On top of that, biometric authentication is often easier for users: you carry you around everywhere. Putting a finger over a keypad or looking into an eye scanner isn’t tough to do. Some systems, such as facial recognition, can even authenticate without the user consciously making a gesture. Simply move into a room or sit in front of your computer and you’re authenticated via facial recognition, for instance. Best of all, users aren’t going to forget their fingers or eyes like they do passwords or physical keys. You won’t have all those password reset tickets piling up at your help desk with biometrics.

The bad part about biometrics for authentication

So, what’s the downside? First, while biometrics are generally more secure, they aren’t foolproof. For example, smartphone fingerprint scanners often rely on partial matches, and researchers have found that it’s possible to create “master prints” that match partials well enough to give access to a large number of user accounts.

Researchers have also demonstrated the ability to create fake fingerprints from high quality prints left behind. Others have found ways to use photos or 3D prints to trick iris scanners or facial recognition systems. Sometimes the issue is that the system can be hacked as much as that it too often fails to recognize a valid user: someone wearing different makeup or new glasses, the voice of a user who is sick or has just woken up.

So, it’s no surprise then that quality biometric solutions cost more. In fact, 67 percent of IT professionals cite cost as the biggest reason for not adopting biometric authentication. There are hidden costs, too, with 47% of those surveyed reporting a need to upgrade systems in order to support a shift to biometrics.

This is why many companies considering adoption of biometrics are focused on using it as only one component of multi-factor authentication (MFA). MFA can require a biometric factor and a non-biometric one. If one authentication factor is hacked, the user’s account is still secured by the other. And with tools like risk-based authentication, MFA can adapt to challenge users when the probability of cybercrime is high and reduce the barriers to entry when it’s low.

The ugly side of biometrics

If you’ve been following developments in biometrics, you’re probably aware of the ethical concerns surrounding many forms of biometrics. One of them involves bias. Facial recognition systems may not recognize POC or non-CIS gender people as accurately. And learning systems for biometrics have too often been based primarily on white or white male photos, creating a clear bias that results in difficulty recognizing people in the broader population.

Additionally, there are fears about how biometric data could be used. Who has access to images used for facial recognition, fingerprints, or voice patterns? Is it acceptable for companies to sell or provide their biometric data to others, such as law enforcement, immigration enforcement, or repressive foreign governments?

For businesses, another ugly side of biometric data is the storage issue. Where biometric data is stored, it must be stored securely. Because if it’s hacked, there’s no going back—a person can’t change their fingerprint or their iris. That means losing your biometric data presents a permanent risk of hacking for the rest of your life.

Companies that choose to store employees’ or customers’ biometric data are taking on a big financial and ethical responsibility. This is one reason to consider on device storage: where the biometric data is stored on the device that authenticates the user, like the user’s smartphone or computer. This gives the user control over the data and it also restricts its location to a local device, reducing the likelihood of a cyber criminal gaining access to large sets of biometric data through a single breach.

While there are many sides to the biometric debate, one thing is for certain: the technology is here to stay. Despite the bad and the ugly side of biometrics, the good side is outweighing them, enough that companies are expected to continue adopting biometrics for authentication.

Thanks for signing up.

We’ve sent a verification email to

To complete your trial sign up, please check your email and follow instructions to verify. You may need to check your spam. You will be prompted to set up a password and log in. Please note that your user name is your email address.

Get Started in 3 Easy Steps:

Try OneLogin Free for 30 days

All fields are required

  • This field is required.
  • Please enter your first name
  • Please enter your last name
  • Please enter your job title
  • Please enter your phone number
  • Note: Please enter a work email address only as we DO NOT accept web-mail addresses (gmail, yahoo, hotmail, etc.)

    Is that a correct business email address?
  • Please enter company name
  • .onelogin.com
    Please choose another subdomain
  • Please enter number of employees
  • Please enter country
  • Please enter state
  • By completing and submitting this form, I agree to the storing and processing of my personal data by OneLogin as described in our Terms of Service and Privacy Policy.

  • Invalid reCaptcha
  • By creating your account, you agree to the Terms of Service and Privacy Policy.

Related Resources:

5 reasons relying on passwords is a recipe for disaster

Passwords alone are not enough to protect your corporate data. Here are five reasons why.

Read More

How MFA helps prevent common cyberattacks

See how Multi-Factor Authentication (MFA) helps to prevent some of the most common and successful types of cyber attacks.

Learn

Together, SSO and MFA secure access and address the technology industry’s password problem

Find out how SSO and MFA together are key to protecting your tech company’s corporate data and intellectual property.

Download the Paper

3 lessons Game of Thrones can teach us about cybersecurity

Are there similarities between the defenses of the Night’s Watch and those of cybersecurity teams in the real world? You be the judge.

Read the Blog