Five Tips for a Successful Voice Biometrics Deployment

When it comes time to implement a new voice biometric identity verification solution in your enterprise, you don’t want to rush the process by investing in the wrong solution. End-user authentication is a process that you want to take seriously, as your security solution will be responsible for safeguarding all of your organization’s sensitive mobile data.

Here are five voice biometrics deployment tips to guide you across the enterprise:

  • Shop around: Not all voice biometrics solutions are created equal, as some are difficult to integrate into your system. Find a provider that you know will outfit your company with a reliable and flexible solution.
  • Educate your end users: Once you find a voice biometrics provider that you would like to work with, spend some time educating your end users about the new authentication changes that will be taking place. Have a meeting about the issue with your staff, and let your end users know that it’s time to start taking mobile security seriously. Let them know how voice biometrics will help.
  • Plan ahead: Assess your organization’s needs so that you have an idea of what investments to make and deploy across the enterprise. Come up with a firm number for how many end users the solution must support and how many devices each user brings into play. Once you know these figures, you will have a better idea of the type of solution that will be right for your business.
  • Test your solution: The last thing you want to do is enter into a binding contract with a security vendor only to find out afterward that it’s not a great fit. Find a vendor that will allow you to thoroughly vet your solution, such as with a free trial.
  • Encourage multifactor use: Let your employees know that voice biometrics can be used in conjunction with other multifactor security options like passwords and PINs. If you need to demonstrate the necessity of multifactor security, look no further than the recent data heist at the IRS for an example. Experts believe that if multifactor security had been deployed on IRS employee mobile devices, hackers would have been less able to break in and obtain access to hundreds of thousands of taxpayer accounts.

Download the Mobile Voice Biometrics White Paper

Or download the ViGo, Mobile Voice Biometrics, Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Let Your Application Be A Foundation For Mobile Security In Your Enterprise

Are you feeling overwhelmed trying to thwart the multitude of digital threats facing your enterprise? With so much risk residing online today, the challenge of keeping your enterprise secure can seem like a never-ending process. In fact, it can be difficult to even know where to start.

While the challenge may be difficult, it’s not impossible; and one of the best ways of staying out of trouble is to build a foundation of security that starts at the application level. You can’t, in other words, trust that your employees will stay out of trouble online. Mobile security needs to be built directly into your mobile software.

Why? Your employees are using mobile devices to communicate, collaborate, and access corporate data and networks on a daily basis. These devices are great for convenience and productivity purposes, but they also represent a major cyber security risk if they are not fortified with the right type of mobile security authentication software. A stolen, lost, or compromised mobile device can spell disaster from a cyber security perspective if it isn’t protected with a proven security solution.

Voice biometric identity verification is one technology that you can use to build this foundation of trust. Voice biometric authentication will ensure that any device picked up by someone other than its rightful owner can’t be accessed. End users simply have to set up a unique voiceprint during registration, and then recite a short phrase during subsequent logins. It can serve as either a standalone mobile security solution, or it can be used to compliment other forms of authentication in multifactor form.

VoiceVault, a leading provider of mobile security identity verification software, can work with your team to build a voice biometrics engine directly into your application. Click here to learn more about how you can leverage VoiceVault’s expertise.

Download the Mobile Voice Biometrics White Paper

Or download the ViGo, Mobile Voice Biometrics, Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Replace Your Paper-based Time and Attendance System With Voice Biometrics

Your employees may be robbing your business blind. We’re not referring to stealing money or objects from your enterprise. The type of fraudulent behavior we are referring to is called time theft, and it costs U.S. businesses billions of dollars every year.

What is time theft? It occurs when employees claim to work a certain number of hours without actually putting in the total amount of work. Some common examples of time and attendance fraud occurs when employees take longer breaks than they are allotted or have other employees punch their time cards for them in lieu of actually being present at the job site (buddy punching).

Time theft could also occur on the road, when employees take excessive amounts of time traveling in between branch locations or client sites. One industry that is rife with time fraud, for instance, is home healthcare, where it’s difficult to determine via paper-based documentation whether employees are actually visiting patient homes for routine visits.

The truth is that your business can’t afford to pay employees for time that they are not working. Consequently, it’s time to migrate away from paper-based time cards and embrace a new way of measuring productivity—through voice biometric identity verification.

By incorporating voice biometric identity verification into your time management system, you can ensure that employees are in fact where they claim to be at the time they document their work.  All your employees have to do is speak a simple phrase, and the application will be able to verify whether that user is who he or she claims to be.

The entire process only takes a few seconds, and it could save you valuable dollars in the long run while also establishing a culture of integrity in your organization.

Click here to learn how VoiceVault, a leading provider of voice biometric identity verification, is helping healthcare companies combat time and attendance fraud and abuse.

 

Read the Case Study

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Ban Password Lists

Imagine if you took a set of keys that unlocked every single door in your office and stashed the key ring in the bushes outside of your door. If this sounds ridiculous (as it should), then why is it that you essentially take the same approach with your company’s passwords?

Chances are likely, in other words, that many of your employees—with or without your knowledge—have files stashed on their computers that contain passwords to just about every website in their personal and private lives. From Facebook to Dropbox to online email accounts, password lists are the proverbial key to the castle; and they’re threatening to bring down your entire enterprise.

For proof of this, look no further than what happened at Sony last fall. After the company’s recent high-profile data breach, it was discovered that there was a folder titled “Password” on the network. This folder contained over 100 Word documents, spreadsheets, PDFs and other files that contained passwords to a multitude of private accounts—literally a trove of digital information.

So, what can you do to prevent this from happening? First, take a hard look at how your company is using passwords in your enterprise. You would be ill-advised to use passwords as your primary method of end user authentication unless the password is backed up with additional security elements like voice biometric identity verification or security questions. If your company is still relying heavily on passwords, however, make it your personal mission to ban password lists on PCs and mobile devices.

There are a few steps you can take aside from banning passwords like discouraging your employees from migrating their files into one central location. After all, keeping every password together is a bad idea especially if they are kept in a physical notebook. Instead, your company should leverage Single Sign On (SSO) solutions, which provide the ability to log into multiple accounts using one password. This can drastically reduce the amount of information for which employees need to keep track. You could also encourage company staffers to keep passwords stored in memory only, which is by far the safest measure you can take; instead of writing down actual passwords, have them jot down hints or password recall prompts that will help them remember the information should they forget.

Employees should also feel comfortable emailing the IT department in the event that they forget their passwords. IT can send temporary codes to reset the information and handle the problem in a secure manner.

VoiceVault, a leading provider of voice biometric identity verification solutions, can help you streamline the authentication process through its advanced line of voice recognition products. You can find out more information about how VoiceVault can keep your enterprise secure by reading this white paper.

 

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Looking to Tighten Your BYOD Security? Focus on Securing Your Data

As an IT manager, you have the responsibility to secure company information that end users may download onto their mobile devices. This is one of the most important responsibilities of running a successful bring your own device (BYOD) program. Unfortunately, security is still a major barrier to implementing mobility for many organizations, both public and private. For instance, 73 percent of federal IT executives claim that security is their greatest obstacle to utilizing mobility.

In the past, the majority of IT managers ensured BYOD safety with the use of mobile device management (MDM) software. This software is typically deployed from an on-premises server and distributed to remote end-user devices for monitoring and managing purposes. But MDM software was not designed to secure data, just the devices. Due to the growing threat of mobile malware attacks, which increased by 27.6 percent last year, and the ease with which a mobile device can contract malware, IT managers need to change their approach and focus on protecting sensitive company information instead of end-user devices. Managers need to ask who is accessing company data, where the data is being stored, and what security measures are in place to prevent unauthorized users from gaining access to it.

Right now, the best option that IT managers have for protecting mobile endpoints is to store sensitive company information in the cloud and provision it to end users from a remote location. The information should then be protected using multifactor security elements, which can include a combination of features like voice biometric identity verification, passwords and security questions. By taking this approach, if a mobile device is hacked or stolen, an unauthorized user would not be able to gain access to sensitive information. For added security, IT managers can also suspend access to a user account from a cloud-based API.

If you are looking for a smarter, more cost-effective way to secure your mobile end users using cloud technology, consider VoiceVault—a leading provider of voice-based mobile identity verification solutions. For more information about how VoiceVault can provide your company with the latest in voice biometric technology, click here.

Register for a FREE Trial Now

Or download the ViGo, Mobile Voice Biometrics, Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Protect Your Customers With Voice Biometrics This Tax Season

Tax season is here, which means millions of Americans are getting their ducks in a row and contacting Uncle Sam for their hard-earned income—in the form of a refund. As a tax specialist, your business is committed to ensuring that your customers end up with every penny to which they are entitled.

To further that agenda, you need to make sure that your customers actually receive their refunds instead of having them line the pockets of third-party hackers. The tax season is one of the worst times of the year for fraud—and theft of sensitive data, too. Consider the fact that in 2014, hackers stole over 6.5 million social security numbers; these numbers can be sold for between $3 to $5 each online if bundled with other pieces of private data.

To safeguard your clients’ money and privacy, you need to tighten your business’s digital security during vulnerable mobile transactions such as phone calls, account access and digital submission of claims.

Voice biometric identity verification is a low-cost yet secure solution that you can use to achieve your security goals. Using voice biometrics, you can enroll customers over the phone using one of two methods: Customers can either choose to recite a specific phrase every time they contact your organization and request personal account information, or they can do it passively by reciting a phrase and registering their voice in your system. Then, the next time they dial in, the computer will be trained to recognize their voice and either grant or deny access. This can eliminate the need for outdated security measures like passwords and PINs.

Customers can also use this technology when logging into your mobile application to check the status of their claims, submit their forms or consult with specialists.

Making a small investment now could ultimately save your business—and its customers—from a costly data breach.

 

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

The Difference Between Active and Passive Voice Authentication in Contact Centers

Once you decide to invest in voice biometric identity verification for your contact center, you’ll have a decision to make: You can either choose to implement an active enrollment process, where the customer submits a voiceprint series of specific statements, or you can choose to install a passive system where the customer submits a voiceprint during a standard conversation.

In an active voice biometric solution, the customer will recite up to five specific phrases into the phone, which will establish his or her unique voiceprint. This type of enrollment is considered “active” because the user must knowingly submit a specific phrase that will be used for future authentication purposes. The user’s voiceprint is then compared to his or her enrollment samples every time he or she subsequently dials into the contact center.

Passive voice biometric identity verification, by comparison, also requires a user to enroll by submitting a unique voiceprint during initial registration. Unlike active voice biometric enrollment, however, passive enrollment does not require the customer to recite a specific phrase. It works by recording a user’s unique voiceprint during an initial conversation, which typically needs to last about 45 seconds. Then, the user’s voiceprint can be compared to that voiceprint the next time he or she dials into the contact center.

Which is the better solution? Active voice biometric identity verification uses far less data during enrollment, which means your business will not have to store as much information. This means that the active method is more scalable, as it requires less storage capacity, and computing and processing power than the passive method.

It’s also more accurate for authenticating individual users, but less adept at identifying and reporting fraudsters.

If your business is looking to intercept fraudulent callers, you are advised to roll out a passive solution and fortify the technology with additional security features like passwords and personal identification numbers.

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Three Digital Security Strategies You Should Adopt in 2015

2014 was a year of learning about Internet risks for many business leaders, as cybersecurity threats became so ubiquitous that they finally reached a mainstream level of awareness. Several major corporations experienced brutal cyberattacks, and millions of sensitive corporate files were exposed to the public.

Whether your company was affected or you managed to escape into 2015 unscathed, take our advice: It’s time to overhaul your digital security strategy and make sure that your organization is prepared to handle another year full of malicious cyberattacks. Some industry pundits believe that 2015 could be just as hard, if not worse, than last year for safeguarding against criminal activity online.

Here are three things you should make sure to include in your strategy:

1.  Account access: A data breach can arise from the inside of your organization just as easily as it can from the outside. We’re not saying you shouldn’t trust your employees, but making security a priority requires battening down the hatches. Ensure you have the technology, such as that provided through a cloud-based identity management system, in place so that you can easily revoke data access when necessary. This way, if an employee does exhibit threatening or criminal behavior, his or her account can be blocked quickly and efficiently, preventing damage to your assets.

2.  Embrace multifactor authentication: Many major corporations still rely on a single method of account authentication such as a password or personal identification number (PIN). This year, embrace multifactor authentication by requiring employees to use passwords and PINs, or another form of identification. This way, if a password is stolen, a hacker would have a much harder time gaining access into an account.

One example of a company that offers great multifactor account authentication is Google. Google employees are given unique one-time PIN numbers to use when logging into a mobile device. This number can be used in addition to a password to provide higher security.

3.  Secure your applications: Your organization may have thousands of employees and millions of customers accessing your corporate applications on a daily basis. Stop and think about how vulnerable this makes your organization to hackers if you do not have secure authentication methods like voice biometric identity verification deployed. Design your applications with security in mind so that unauthorized users are kept out of your network.

 

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Digital Security Solutions for After the Holiday Season

The busy digital holiday shopping season is almost over. But this is no time to let your guard down, as cybercriminals are still out in full force looking for software vulnerabilities that can provide easy entry into your network.

Now is the time to be vigilant about digital security and protecting your software so that you can make it through the holiday season unscathed by costly cyberattacks. Here are some tips that you can use to fortify your network and provide extra strength during this risky time:

Patch your servers: Patch management should not be an annual or quarterly habit. It should be a monthly activity so that you constantly have the most up-to-date software running at all times. Therefore, even if you patched your servers before the start of the holiday season, do it again.

Run a vulnerability assessment: Once you patch your servers, scan your network using a vulnerability assessment tool to make sure that every server is in top working order. This will help you identify and rank system vulnerabilities, so that your IT department can be aware of possible threats and monitor the network accordingly.

Protect your customer-facing websites: Don’t get so caught up in patching your back-end servers that you fail to take your customer-facing Web and mobile sites into account. Now is the time to double check for weaknesses that could lead to hacks like SQL injection, which could take down your entire website.

Fortify your mobile endpoints: Make multifactor security a priority in your enterprise. Ensure that employees and customers have access to a variety of mobile identity verification solutions to provide advanced authentication. The more secure your authentication strategy, the better chance you will have of protecting your endpoints and reducing the likelihood of a data breach.

Hoping you had a safe and prosperous holiday season from everyone here at VoiceVault.

 

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store

Regardless of Size, No Business Is Safe Online These Days

As a small business owner, you are used to flying under the radar. Your business serves a small community, either online or offline. As a result of the lack of mainstream media attention your business receives, you might be under the impression that you are safe from the risk of being hacked.

This is your wake-up call. The Internet is not a safe place to conduct business without the proper digital security safeguards. Hackers want access to your information just as badly as they do any Fortune 500 company’s. If your network is unprotected, eventually you will get hacked. Furthermore, as a small business, you most likely do not have the resources to recover from a costly data breach.

Unfortunately, many businesses are not even aware when their systems get hacked. Take, for instance, a recent cyberattack at USIS—a leading security clearance contractor for the U.S. government—that went unnoticed for several months. This is a massive company with advanced cyber detection technologies. If it can happen to this company, it can just as easily happen to your business.

Therefore, stop and assess your company’s current digital security safeguards. It’s important to remember that, in addition to the risk of exposure posed by your computers, your mobile devices are just as vulnerable to attack. Mobile multifactor authentication is needed, therefore, to ensure that information that is accessed over a computer or mobile device stays out of the hands of hackers.

Recent advancements in voice biometric technology have made it easier than ever to incorporate affordable and secure identity verification software into your business’s mobile devices. Voice biometric safeguards can be built right into the framework of an existing application, so your business can quickly and efficiently bolster its endpoints.

Click here for more information about how VoiceVault, a leading provider of voice biometric technology, can help keep your business safe.

 

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App
ViGo-on-Google-PlayViGo-on-the-App-Store