Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpgAny user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did you know there’s a security method that uses your mouse’s behavior to authorize your login?

A startup called BioCatch has developed an authentication procedure that analyzes your mouse movements and behavior. Everyone has probably encountered two-factor authentication at some point or another, be it for a bank account login or email inbox access; but we doubt that you’ve ever given mouse two-factor authentication a shot.

According to BioCatch, the way that a PC user uses a mouse can identify who they are. ZDNet explains:

The entire way that we use the human-machine interface embedded within each and every modern computer, browser, or website, is like a unique fingerprint. Lefties will operate a mouse differently to right-handed people, for example, and each user ‘grabs’ an icon at a different point, angle, and so on.

Essentially, BioCatch’s idea looks at the way users move their mouse to build a “character profile,” so to speak. This helps identify whether the user is actually who they say they are. In fact, it’s been estimated that this method of authentication can prevent fraudulent logins up to 80 to 90 percent of the time.

In addition to monitoring your mouse movement, BioCatch’s solution considers other aspects, crammed into four layers of properties:

Layer One: Standard Authentication
Layer one consists of the device, network, IP address, hardware, and location - all traits that physically tie you to your PC. These are the typical authentication properties used when logging into an account. The following layers, however, take a much different approach to authentication.

Layer Two: Physical Profile
Layer two consists of mainly motion-related actions, such as moving objects around the screen, hand-eye coordination, and the mouse pointer (or finger on touch screen devices).

Layer Three: Cognitive Profile
Layer three consists of examining mental abilities, such as response time and connection time. It also looks for suspicious activity that is out of the norm. One example used by ZDnet is online banking - normally, a user would check their balance before doing anything. If a money transfer is their top priority, something might be up.

Layer Four: Invisible Challenges
BioCatch’s final layer of protection is meant to authenticate a user’s identity, but not in the traditional sense. BioCatch purposely puts problems in the way of the user in order to determine who they are. Everyone reacts to potential threats differently, and their response can be used to verify one’s identity.

Will mouse two-factor authentication catch on? We don’t know; but what Total Tech Care does count on is the importance of two-factor authentication in general. Users need to have more than just a password protecting their accounts if they want to stay secure. This is especially important for any business-related material. With today’s sophisticated hacking tools and procedures, all it takes is one skilled hacker to crack a password.

To get started with two-factor authentication, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Phishing Managed IT Services Windows Outsourced IT Data Backup Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Passwords Windows 10 Saving Money Holiday Gadgets Tech Term Chrome Social Media Virtualization Managed IT Services Managed Service Automation Microsoft Office Operating System Artificial Intelligence Facebook Cybercrime Computers Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Health BYOD Spam Remote Information Office 365 Telephone Systems Alert Managed Service Provider Information Technology Covid-19 Bandwidth BDR Social Engineering Mobility Employer-Employee Relationship Recovery Router Remote Monitoring Law Enforcement App History Big Data Password Money Encryption Human Resources Applications Mobile Computing Data Breach Application Paperless Office Private Cloud How To Managed IT Office Tips Training Apps Data Storage Patch Management VPN Remote Computing Blockchain Mobile Office Government Avoiding Downtime Data Security Infrastructure Voice over Internet Protocol Wireless Bring Your Own Device Data Management Work/Life Balance Gmail Vulnerability Settings Flexibility Windows 7 Word Marketing Two-factor Authentication WiFi Google Drive IT solutions Servers Entertainment Website Mouse Budget HaaS User Error Software as a Service Telephone System Staff Meetings Machine Learning Connectivity Remote Work Save Time Risk Management Hacker Vendor Managed Services Display The Internet of Things Lithium-ion battery Cleaning Conferencing Data Protection Employee/Employer Relationship Scam End of Support RMM Firewall Education Physical Security Safety Virtual Reality Sports HIPAA Apple Redundancy Vendor Management Keyboard Social USB YouTube Compliance Black Market OneNote Computer Care IT Consultant Procurement Net Neutrality Current Events Workplace Strategy Wearable Technology Telephony Humor Update Help Desk Retail Hard Drives Samsung Printing Document Management Instant Messaging Robot Wireless Technology Excel Solid State Drive Google Docs How to Downtime Value Identity Theft Biometrics Virtual Desktop Spam Blocking Electronic Medical Records Managed Services Provider Data storage Automobile Database Hiring/Firing DDoS Remote Workers Augmented Reality Fraud SharePoint Computing Infrastructure Going Green Processor Remote Worker Virus Customer Service Cryptocurrency Hard Drive Battery Unified Threat Management Business Intelligence Environment Shadow IT Computer Accessories Legal Fax Server Audit Worker Computing Comparison IT Management Internet Exlporer Botnet CES SaaS IT Plan Printer PDF Business Technology Bluetooth Content Management Access Control Digital Signage Network Congestion Unsupported Software Proactive IT eWaste Charger Virtual Assistant Authentication Best Practice Emails AI Cables Experience IT Infrastructure Sync Scalability Bing Shortcut FinTech Nanotechnology Social Network Telecommuting Business Owner Cost Management Project Management NarrowBand Netflix Two Factor Authentication Cortana Investment Social Networking Search Root Cause Analysis Employees Digital Signature Employee/Employer Relationships Windows 365 Music ISP iPhone HBO Knowledge Warranty HVAC Video Conferencing Google Apps ROI Running Cable Skype Bitcoin Shortcuts Data loss Memory Sales Analysis Point of Sale Troubleshooting Devices Personal Consultant Cryptomining Files Outlook Leadership Administrator Chromecast Enterprise Content Management Supply Chain Management Analytics Start Menu Batteries Screen Mirroring Loyalty MSP Monitoring Accountants Windows 8.1 Books Thought Leadership Digitize Best Available Credit Cards Colocation Frequently Asked Questions Uninterrupted Power Supply Microchip Windows 10s Science Password Management WIndows 7 Password Manager Windows Server 2008 R2 Mobile Multi-Factor Security Monitor Cast Customer relationships Search Engine Email Best Practices Emergency Twitter IT Assessment Manufacturing Tip of the week webinar Professional Services Customer Relationship Management Public Cloud Employer Employee Relationship NIST Business Mangement Distributed Denial of Service Smart Tech Managed IT Service Trending Security Cameras Reputation Analyitcs Streaming Media Assessment Computer Tips Virtual CIO Addiction OneDrive Amazon Content Biometric Security Windows Server 2008 Programming Tech Support Techology Tools Windows Media Player Laptop Peripheral User Recycling PowerPoint Practices Using Data Customers Television Wiring Digital Security Cameras Cache Copiers Amazon Web Services Audiobook 5G Antivirus Touchpad Windows 8 Safe Mode Quick Tip Managing Stress Criminal Hosted Computing Smartwatch IT service Public Computer GDPR Ergonomics Transportation Wireless Internet Development Online Shopping Politics OLED Cameras Advertising Regulations Computer Fan Tablet Rootkit File Sharing PCI DSS Virtual Machine Inventory Fiber Optics Specifications Employee Domains Notifications Camera 2FA Workers Benefits Wire Messaging Evernote Cabling Travel Maintenance FENG Policy Hypervisor IaaS Trend Micro Millennials Relocation Bloatware IBM Printers Dark mode Smart Technology Smart Office SMS Wireless Charging Default App Printer Server Flash Video Games Tablets Procedure Saving Time Shopping Workforce Worker Commute Google Search Software Tips Entrepreneur Supercomputer Virtual Private Network dark theme

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code