April 13, 2016 -
A database has been breached and biometric data is “in the wild”. Conceivably, this stolen data could be used by the perpetrators to hijack a user’s identity and gain fraudulent access to restricted areas, bank accounts, healthcare records — wherever biometric authentication is securing valuable assets.
What can be done to render biometric data useless to any would-be impostor?
The white paper “Protecting Against Criminal Use of Stolen Biometric Data” discusses numerous tactics and best practices that should be considered in order to protect individuals and organizations from the fraudulent use of true identities.