Why locking your mobile device with a fingerprint is a great idea

One of the rumors leading into the Apple iPhone 5 event today is that the new smartphone will incorporate fingerprint scanning technology.

Apple is hosting a major media event today to unveil the iPhone 5. In the days leading up to any iPhone announcement there's always a good deal of heated speculation regarding what features and capabilities the new smartphone will have.

Smartphones and tablets store gigabytes of data. They have banking apps, and apps that access credit card or investment accounts. They connect to email, and social networks. If a mobile device falls into the wrong hands, it's possible that sensitive information and data could be compromised. That's why your smartphones and tablets need to be locked down and protected.

One of the rumors floating around about the iPhone 5 is that it might come with fingerprint scanning technology. If it's true, it would be a game changer for smartphone security.

The rumor stems from Apple's recent acquisition of a company called AuthenTec. AuthenTec is known for developing fingerprint scanning technology for mobile devices. It seems reasonable to assume that Apple didn't spend $360 million for the company if it doesn't have any use for the fingerprint scanning capabilities it's known for.

It remains to be seen if whether or not the iPhone 5 will actually incorporate the AuthenTec fingerprint sensors. It's possible that Apple is planning to build the technology into future iPhones, iPads, or Macs. But, if Apple does use fingerprint scanning technology to lock the iPhone it would be a great step in the right direction for smartphone security.

Most smartphones are locked with a simple four-digit PIN if they're locked down at all. The four-digit PIN is better than nothing, but it's certainly not the most secure option available. iOS devices have an option to require a more complex alphanumeric passcode, which would be much more difficult to guess in most cases.

Android added an ability to unlock the mobile device using facial recognition. Facial recognition can't be guessed or cracked in the same way a password can--only you have your face. However, that isn't entirely true. If you happen to have a reasonable headshot photo of the individual, you can just hold your picture up to the phone and unlock it.

You can't do that with a fingerprint, though. And, the fingerprint authentication can be extended beyond simply unlocking the device itself. If developers have access to the fingerprint scanning capabilities through an API, or if the smartphone OS has an ability to store credentials and passwords in a sort of locker that is accessed via the fingerprint, then the fingerprint becomes a more secure means of accessing apps and other sensitive information on the device as well.

Improving the method of authentication will help prevent unauthorized access to data should the smartphone be lost or stolen. It's important that you don't rely only on locking the device, though. You also need a cross-device security platform in place to guard against malware and protect your data from other malicious attacks.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Charles Ripley

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts