Renew Your Vow to Improve Mobile Security in Your Enterprise

It’s time we had a little talk about your business’s mobile security plan.

Earlier this year, after a series of high profile data breaches exposed troves of sensitive information from Anthem, CVS and the IRS, you panicked and vowed to take advanced measures to thwart a cyberattack in your own company. Your plan was to start by implementing a robust mobile authentication policy.

Now it’s December and nothing has changed in regard to your strategy. Your end users are still utilizing archaic password systems to protect their mobile accounts.

Why is this a problem? It’s because data is a hot commodity due to its tremendous value. Research shows that stolen individual health credentials go for about $10 each on the black market. A PayPal or eBay account will fetch $27. And a fresh credit card can sell for as much as $45.

What should be becoming clearer to you, then, is that hackers are after your private information. If you give them enough time—and fail to take the proper security precautions—your organization will eventually be breached.

So, how do you begin to protect your data?

One easy way you can overhaul mobile security in your enterprise is by implementing first-class voice biometric identity verification. By using an application like ViGo from VoiceVault, you can obtain secure and affordable voice-activated protection with little to no hassle. ViGo can be easily added onto your mobile application’s login screen so that end users must speak a phrase or series of digits into their microphone to gain entry into their accounts. ViGo can also be supplemented with multifactor security for advanced protection beyond voice biometrics.

Want to get a better sense of how ViGo works? Why not try it out for yourself?

Register for a FREE ViGo Trial Now

Or download the ViGo Demo App

Voice e-Signatures: It’s Time to Abandon Ink-based Signatures in Your Enterprise

You’re 10 minutes into a phone call with a customer who is on the verge of signing up for your company’s services … when wham (pump the brakes!), the usual roadblock arises: the authentication process.

For many companies, this is where an easy 10-minute phone call turns into a prolonged waiting period of several weeks or more. First, consent forms must be mailed to (and received by) the customer. Then, the customer must actually sign the documents and send them back to the right office. Oftentimes, forms must be resent and additional phone calls must be made before the process can continue and services can begin.

Further, once the paper is returned, it must be filed and looked after, which drives up the cost of paper management considerably. In fact, according to Thomson Reuters, a firm with 500 clients can actually spend more than $28,000 per year managing paper. This also invites a significant amount of risk into the process as documents can be easily lost, stolen or compromised.

Here’s an easier, safer and more affordable way that you can collect customer or patient consent forms: Invest in a voice e-signature solution. As explained in the below video from VoiceVault, a leading provider of enterprise and mobile voice authentication solutions, and Enacomm, voice e-signatures are recognized as legally binding signatures by the American Bar Association, as well as per the parameters of the U.S. E-Signature Act, HIPAA/CMS and FDA 21 CFR 11 regulations for electronic records.

By using voice biometric identity verification to collect and store customer signatures, your agents will be able to finalize more customer transactions, as the waiting period will be eliminated. And customers will love the simple and secure process.

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App

Looking for More Than Just Mobile Identity Verification Software?

VoiceVault’s mobile voice biometric identity verification software is great for the following types of companies:

  • Those with less than 10,000 users.
  • Those looking for a plug-and-play, pre-configured, cloud-based security solution.

Your business, however, has more than 10,000 end users and more-comprehensive needs—way more. Further, it’s looking for identity protection in other areas of the enterprise beyond basic mobile. So, can you still benefit from a VoiceVault implementation?

You sure can. Here’s how:

The VoiceVault package that would benefit your organization most is called Fusion Enterprise. What is Fusion Enterprise? Essentially, it’s the same platform on which our ViGo mobile solution is built; it uses the same API and server-side architecture.

The main difference is that Fusion Enterprise is a more dynamic product as it comes with greater flexibility and a limitless number of end users. For instance, Fusion Enterprise can be used in customer-facing settings like contact centers and website access applications, in addition to mobile applications. You can, therefore, use Fusion Enterprise to combat consumer fraud when callers dial in and request information from your agents.

Further, using Fusion Enterprise, you can choose how—and where—you want to deploy your software. If you want to use your existing legacy network, you can. You can also choose to utilize the cloud (and gain access to VoiceVault’s free accompanying cloud-based developer environment), or outsource to a managed services provider for a more hands-off approach.

The best part about Fusion Enterprise? VoiceVault allows your developers to configure the software as they please, free from usage restrictions.

Click here for more information.

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App

Five Tips for a Successful Voice Biometrics Deployment

When it comes time to implement a new voice biometric identity verification solution in your enterprise, you don’t want to rush the process by investing in the wrong solution. End-user authentication is a process that you want to take seriously, as your security solution will be responsible for safeguarding all of your organization’s sensitive mobile data.

Here are five voice biometrics deployment tips to guide you across the enterprise:

  • Shop around: Not all voice biometrics solutions are created equal, as some are difficult to integrate into your system. Find a provider that you know will outfit your company with a reliable and flexible solution.
  • Educate your end users: Once you find a voice biometrics provider that you would like to work with, spend some time educating your end users about the new authentication changes that will be taking place. Have a meeting about the issue with your staff, and let your end users know that it’s time to start taking mobile security seriously. Let them know how voice biometrics will help.
  • Plan ahead: Assess your organization’s needs so that you have an idea of what investments to make and deploy across the enterprise. Come up with a firm number for how many end users the solution must support and how many devices each user brings into play. Once you know these figures, you will have a better idea of the type of solution that will be right for your business.
  • Test your solution: The last thing you want to do is enter into a binding contract with a security vendor only to find out afterward that it’s not a great fit. Find a vendor that will allow you to thoroughly vet your solution, such as with a free trial.
  • Encourage multifactor use: Let your employees know that voice biometrics can be used in conjunction with other multifactor security options like passwords and PINs. If you need to demonstrate the necessity of multifactor security, look no further than the recent data heist at the IRS for an example. Experts believe that if multifactor security had been deployed on IRS employee mobile devices, hackers would have been less able to break in and obtain access to hundreds of thousands of taxpayer accounts.

Download the Mobile Voice Biometrics White Paper

Or download the ViGo, Mobile Voice Biometrics, Demo App

Let Your Application Be A Foundation For Mobile Security In Your Enterprise

Are you feeling overwhelmed trying to thwart the multitude of digital threats facing your enterprise? With so much risk residing online today, the challenge of keeping your enterprise secure can seem like a never-ending process. In fact, it can be difficult to even know where to start.

While the challenge may be difficult, it’s not impossible; and one of the best ways of staying out of trouble is to build a foundation of security that starts at the application level. You can’t, in other words, trust that your employees will stay out of trouble online. Mobile security needs to be built directly into your mobile software.

Why? Your employees are using mobile devices to communicate, collaborate, and access corporate data and networks on a daily basis. These devices are great for convenience and productivity purposes, but they also represent a major cyber security risk if they are not fortified with the right type of mobile security authentication software. A stolen, lost, or compromised mobile device can spell disaster from a cyber security perspective if it isn’t protected with a proven security solution.

Voice biometric identity verification is one technology that you can use to build this foundation of trust. Voice biometric authentication will ensure that any device picked up by someone other than its rightful owner can’t be accessed. End users simply have to set up a unique voiceprint during registration, and then recite a short phrase during subsequent logins. It can serve as either a standalone mobile security solution, or it can be used to compliment other forms of authentication in multifactor form.

VoiceVault, a leading provider of mobile security identity verification software, can work with your team to build a voice biometrics engine directly into your application. Click here to learn more about how you can leverage VoiceVault’s expertise.

Download the Mobile Voice Biometrics White Paper

Or download the ViGo, Mobile Voice Biometrics, Demo App


Replace Your Paper-based Time and Attendance System With Voice Biometrics

Your employees may be robbing your business blind. We’re not referring to stealing money or objects from your enterprise. The type of fraudulent behavior we are referring to is called time theft, and it costs U.S. businesses billions of dollars every year.

What is time theft? It occurs when employees claim to work a certain number of hours without actually putting in the total amount of work. Some common examples of time and attendance fraud occurs when employees take longer breaks than they are allotted or have other employees punch their time cards for them in lieu of actually being present at the job site (buddy punching).

Time theft could also occur on the road, when employees take excessive amounts of time traveling in between branch locations or client sites. One industry that is rife with time fraud, for instance, is home healthcare, where it’s difficult to determine via paper-based documentation whether employees are actually visiting patient homes for routine visits.

The truth is that your business can’t afford to pay employees for time that they are not working. Consequently, it’s time to migrate away from paper-based time cards and embrace a new way of measuring productivity—through voice biometric identity verification.

By incorporating voice biometric identity verification into your time management system, you can ensure that employees are in fact where they claim to be at the time they document their work.  All your employees have to do is speak a simple phrase, and the application will be able to verify whether that user is who he or she claims to be.

The entire process only takes a few seconds, and it could save you valuable dollars in the long run while also establishing a culture of integrity in your organization.

Click here to learn how VoiceVault, a leading provider of voice biometric identity verification, is helping healthcare companies combat time and attendance fraud and abuse.


Read the Case Study

Experience Voice Biometrics with the ViGo Demo App

Ban Password Lists

Imagine if you took a set of keys that unlocked every single door in your office and stashed the key ring in the bushes outside of your door. If this sounds ridiculous (as it should), then why is it that you essentially take the same approach with your company’s passwords?

Chances are likely, in other words, that many of your employees—with or without your knowledge—have files stashed on their computers that contain passwords to just about every website in their personal and private lives. From Facebook to Dropbox to online email accounts, password lists are the proverbial key to the castle; and they’re threatening to bring down your entire enterprise.

For proof of this, look no further than what happened at Sony last fall. After the company’s recent high-profile data breach, it was discovered that there was a folder titled “Password” on the network. This folder contained over 100 Word documents, spreadsheets, PDFs and other files that contained passwords to a multitude of private accounts—literally a trove of digital information.

So, what can you do to prevent this from happening? First, take a hard look at how your company is using passwords in your enterprise. You would be ill-advised to use passwords as your primary method of end user authentication unless the password is backed up with additional security elements like voice biometric identity verification or security questions. If your company is still relying heavily on passwords, however, make it your personal mission to ban password lists on PCs and mobile devices.

There are a few steps you can take aside from banning passwords like discouraging your employees from migrating their files into one central location. After all, keeping every password together is a bad idea especially if they are kept in a physical notebook. Instead, your company should leverage Single Sign On (SSO) solutions, which provide the ability to log into multiple accounts using one password. This can drastically reduce the amount of information for which employees need to keep track. You could also encourage company staffers to keep passwords stored in memory only, which is by far the safest measure you can take; instead of writing down actual passwords, have them jot down hints or password recall prompts that will help them remember the information should they forget.

Employees should also feel comfortable emailing the IT department in the event that they forget their passwords. IT can send temporary codes to reset the information and handle the problem in a secure manner.

VoiceVault, a leading provider of voice biometric identity verification solutions, can help you streamline the authentication process through its advanced line of voice recognition products. You can find out more information about how VoiceVault can keep your enterprise secure by reading this white paper.


Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App

Looking to Tighten Your BYOD Security? Focus on Securing Your Data

As an IT manager, you have the responsibility to secure company information that end users may download onto their mobile devices. This is one of the most important responsibilities of running a successful bring your own device (BYOD) program. Unfortunately, security is still a major barrier to implementing mobility for many organizations, both public and private. For instance, 73 percent of federal IT executives claim that security is their greatest obstacle to utilizing mobility.

In the past, the majority of IT managers ensured BYOD safety with the use of mobile device management (MDM) software. This software is typically deployed from an on-premises server and distributed to remote end-user devices for monitoring and managing purposes. But MDM software was not designed to secure data, just the devices. Due to the growing threat of mobile malware attacks, which increased by 27.6 percent last year, and the ease with which a mobile device can contract malware, IT managers need to change their approach and focus on protecting sensitive company information instead of end-user devices. Managers need to ask who is accessing company data, where the data is being stored, and what security measures are in place to prevent unauthorized users from gaining access to it.

Right now, the best option that IT managers have for protecting mobile endpoints is to store sensitive company information in the cloud and provision it to end users from a remote location. The information should then be protected using multifactor security elements, which can include a combination of features like voice biometric identity verification, passwords and security questions. By taking this approach, if a mobile device is hacked or stolen, an unauthorized user would not be able to gain access to sensitive information. For added security, IT managers can also suspend access to a user account from a cloud-based API.

If you are looking for a smarter, more cost-effective way to secure your mobile end users using cloud technology, consider VoiceVault—a leading provider of voice-based mobile identity verification solutions. For more information about how VoiceVault can provide your company with the latest in voice biometric technology, click here.

Register for a FREE Trial Now

Or download the ViGo, Mobile Voice Biometrics, Demo App

Protect Your Customers With Voice Biometrics This Tax Season

Tax season is here, which means millions of Americans are getting their ducks in a row and contacting Uncle Sam for their hard-earned income—in the form of a refund. As a tax specialist, your business is committed to ensuring that your customers end up with every penny to which they are entitled.

To further that agenda, you need to make sure that your customers actually receive their refunds instead of having them line the pockets of third-party hackers. The tax season is one of the worst times of the year for fraud—and theft of sensitive data, too. Consider the fact that in 2014, hackers stole over 6.5 million social security numbers; these numbers can be sold for between $3 to $5 each online if bundled with other pieces of private data.

To safeguard your clients’ money and privacy, you need to tighten your business’s digital security during vulnerable mobile transactions such as phone calls, account access and digital submission of claims.

Voice biometric identity verification is a low-cost yet secure solution that you can use to achieve your security goals. Using voice biometrics, you can enroll customers over the phone using one of two methods: Customers can either choose to recite a specific phrase every time they contact your organization and request personal account information, or they can do it passively by reciting a phrase and registering their voice in your system. Then, the next time they dial in, the computer will be trained to recognize their voice and either grant or deny access. This can eliminate the need for outdated security measures like passwords and PINs.

Customers can also use this technology when logging into your mobile application to check the status of their claims, submit their forms or consult with specialists.

Making a small investment now could ultimately save your business—and its customers—from a costly data breach.


Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App


The Difference Between Active and Passive Voice Authentication in Contact Centers

Once you decide to invest in voice biometric identity verification for your contact center, you’ll have a decision to make: You can either choose to implement an active enrollment process, where the customer submits a voiceprint series of specific statements, or you can choose to install a passive system where the customer submits a voiceprint during a standard conversation.

In an active voice biometric solution, the customer will recite up to five specific phrases into the phone, which will establish his or her unique voiceprint. This type of enrollment is considered “active” because the user must knowingly submit a specific phrase that will be used for future authentication purposes. The user’s voiceprint is then compared to his or her enrollment samples every time he or she subsequently dials into the contact center.

Passive voice biometric identity verification, by comparison, also requires a user to enroll by submitting a unique voiceprint during initial registration. Unlike active voice biometric enrollment, however, passive enrollment does not require the customer to recite a specific phrase. It works by recording a user’s unique voiceprint during an initial conversation, which typically needs to last about 45 seconds. Then, the user’s voiceprint can be compared to that voiceprint the next time he or she dials into the contact center.

Which is the better solution? Active voice biometric identity verification uses far less data during enrollment, which means your business will not have to store as much information. This means that the active method is more scalable, as it requires less storage capacity, and computing and processing power than the passive method.

It’s also more accurate for authenticating individual users, but less adept at identifying and reporting fraudsters.

If your business is looking to intercept fraudulent callers, you are advised to roll out a passive solution and fortify the technology with additional security features like passwords and personal identification numbers.

Register for a FREE Developer Trial Now

Experience Voice Biometrics with the ViGo Demo App