How Apple Is Changing the Security Game


With the announcement of the new iPhone X came a surprising new security feature: facial recognition. Introduced as Face ID, the new form of biometric authentication is far more secure than other facial recognition systems on the market as well as Apple’s own fingerprint identification Touch ID. Face ID is the first 3-D facial recognition system for consumers. Apple says it’s so secure the chance a random stranger could unlock your phone is 1 in a million.

While the average consumer will now have the latest in identity verification software in the palm of their hand, many major organizations protecting sensitive client data still use a two-factor authentication system of far less secure methods such as unique codes and fingerprint identification. While you may contain some personal information on your phone, it doesn’t make much sense for you to have better security than the company protecting your social security number and financial information.

Face ID solves some of the most common ways individuals and major corporations are hacked. The vast majority of security breaches are due to stolen passwords and misused credentials, which are relatively easy these days for hackers to obtain. Your run of the mill hacker however does not have the means to perfectly replicate a victim’s face in a 3-D model. With corporate data hacks so common these days, every organization should be striving to better secure their data. Now they don’t even have to imagine a new security feature, Apple has already shown them the way. We expect to start seeing major companies adopting facial recognition systems as their primary security form in the near future. For more information on Face ID technology, click here.

If you are or have been the victim of digital information hacking, call McCann Investigations at (877) 302-8133. We will provide a free consultation and outline the steps you and your response team need to take to gather and maintain the evidence you need to pursue litigation. We can also explain the critical use of a licensed investigator to perform the forensic investigation and provide an objective opinion on the origination and scope of the compromise.


Leave a Reply

Your email address will not be published. Required fields are marked *