Sign Up to Our Newsletter

Be the first to know the latest updates

Sunday, 29 June 2025
AI & Robotics

Identity theft hits 1.1M reports — and authentication fatigue is only getting worse

Identity theft hits 1.1M reports — and authentication fatigue is only getting worse

For nearly two decades, join a reliable event by Enterprise leaders. The VB transform brings people together with real venture AI strategy together. learn more


From passwords to passwords to a true alphabet of other options-Sekand-Factor Authentication (2FA)/One-Time Password (OTP), Multi-Factor Authentication (MFA), single sign-on (SSO), Silent Network Authentication (SNA) Identity authenticationThere is very little consensus between businesses or customers.

However, there is an agreement on this that these devices require. Fido alliance It was found that more than half of the customers (53%) saw an increase in suspicious messages and online scams in 2024. It was largely operated through SMS, email and phone calls, and only increased by progress in AI.

Even at a time when we see shocking in fraud and related losses – Federal trade commission Last year received more than 1.1 million reports of identity theft alone – businesses should try their best to walk on a criterion amidst strong security and spontaneous convenience. On over-Index either and you risk separating customers-very low hoops and you lose their faith, lots and you lose your patience.

So, how do business attack this delicate balance and implement effective certification solutions?

The customer is always right

When it comes to certification, which businesses decree employees, rarely translate customers. We infected Webauthn As the only form of 2FA for employee certification, a company-wide mandate that took a few weeks. This ‘forced adoption’ works when your employees have no option, but your customers do.

Recently, I wanted to book a hotel for my family holiday, so I went to my favorite travel site, found the right room at a reasonable rate, and went to finalize the transaction. A problem: I ran on an issue with captcha on their page – once, twice. After the third attempt I left, the same room was found at the same rate at the same rate on my contestant’s site, and was booked.

Businesses can largely dedicate the budget to top-of-free marketing that drives customers for their websites, products and services, but if the user prevents friction conversion in experience-so often authentication as the initial touchpoint is authentication-This waste investment occurs. forty percent Businesses say that one of their most pressure challenges is looking for a balance between safety and customer experience, especially reducing friction during account signs.

Customer behavior is difficult to modify, especially around adopting new technology. It does not matter whether biometrics or public-key Cryptography Are more secure, if it is not equally comfortable to use, then adopting the customer will be lagging behind. Why do you think so many people still rely on the password that is easily done (you know who you are!). The reality is that you cannot only force the customer to adopt-such businesses that receive certification, recognize the needs and limits of their customers, meet them where they are comfortable and understand that it may not be a size-fit.

A signal-powered future

In this ground on friction vs freedom, the future of authentication will be operated by continuous signals rather than arbitrary identification probe points such as login or purchase. Think of authentication as a brake system, where businesses can disappoint or release pedals to increase or reduce friction based on customer behavior.

Suppose I get promotion for 20% from new tires from my regular auto shop. If I click on the notification, I would expect a spontaneous login experience-they sent a message to me, I am a long time a customer and I am using their application from a known device. But suppose I travel to Canasus City for work. If I open my laptop and I still log in to my favorite e-commerce platform, I hope to log out of them or need to be needed from them proof of identity To continue the session, as I am in a completely different place based on the previous purchase history.

Think of the ecosystem of applications – shopping, email, social media, home security, streaming services – where we log in once and rarely (if ever) log out. What happens if your device is lost or stolen or your session is kidnapped? Businesses should embrace a zero-trust mentality, where certification is not only to show its identity at the door, then you are free to visit the club, but a constant risk-based procedure that increases friction based on your activity.

The wrinkle here, like so many areas, is AI. Earlier in my career, I created a bot detection model for a startup to separate human behavior from machines. We will monitor how many clicks we will receive from IP and user agent string and if it was more than N in a second, we would assume that it was a bot and blocks that traffic. But now, as we pass reins to AI assistants and autonomous agents to determine dinner, appointments or buy movie tickets, how do you distinguish between a nefarious bot or a person working on your behalf? This is the future of certification and the work enterprises with bleeding in the industry continue to advance.

Authentication: A ‘And’ No ‘Or’ Proposal

Always despite a heavenry of new authentication methods and regional needs in development Singapore’s singpass Or Digital identity of the European Union wallet, Any device will never have a full market share – some customers will always prefer simplicity of options such as OTP, while others will demand the rigor of passke or other modern equipment.

Will remain on businesses to provide a width of options to meet customers, where they are and Apply strategies to protect the root of each method from a pledge of smishing/phissing, social engineering or other identity-based attacks. Between friction and freedom, this certification tag-off-world will not be won by those who prefer one or the other, but those who can comfortably walk the test between the two to guide their customers for safe experiences yet.

Anurag Dodeja Twilio has products, user authentication and identity.,


Source link

Anuragbagde69@gmail.com

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Stay updated with the latest trending news, insights, and top stories. Get the breaking news and in-depth coverage from around the world!

Get Latest Updates and big deals

    Our expertise, as well as our passion for web design, sets us apart from other agencies.