Slide background

The Entersekt blog.

Industry news, security threats, and technology advances in consumer authentication
Why US banking clients don’t use banking apps

Why US banking clients don’t use banking apps


Adoption of mobile banking apps inches up ever slower in the United States. What can be done to encourage use?

Read More ...

Snippet: Here’s a problem. Surveys repeatedly indicate that a sizeable percentage of consumers doubt the security of mobile banking and payments, mindful of the wealth of personal information stored on their phones and suspicious of assurances that their data and money are adequately protected from mobile attack.

Here’s a problem. Surveys repeatedly indicate that a sizeable percentage of consumers doubt the security of mobile banking and payments, mindful of the wealth of personal information stored on their phones and suspicious of assurances that their data and money are adequately protected from mobile attack.

Snippet: A lot of people are excited about the future that biometrics promises. Massive claims are made daily about the technology, especially as it applies to mobile. It’s easy to get caught up in the excitement and see biometrics as a solution to all the problems we currently face. But will deploying fingerprint readers to mobile devices really free us all from digital fraud?

A lot of people are excited about the future that biometrics promises. Massive claims are made daily about the technology, especially as it applies to mobile. It’s easy to get caught up in the excitement and see biometrics as a solution to all the problems we currently face. But will deploying fingerprint readers to mobile devices really free us all from digital fraud?

Snippet: The world has enthusiastically embraced mobile technology. Within a few short years, mobile applications have become a staple of daily life, serving as sources of information, productivity tools or entertaining ways to pass the time. It did not take long for the financial services industry to spot mobile’s potential.

The world has enthusiastically embraced mobile technology. Within a few short years, mobile applications have become a staple of daily life, serving as sources of information, productivity tools or entertaining ways to pass the time. It did not take long for the financial services industry to spot mobile’s potential.

Snippet: On the weekend, I finally had a chance to load my three credit cards into Apple Pay. The process was slick and painless, as you’d expect from Apple: a simple snap of the credit card auto-populated the data on my phone. Only the card security code (three or four digits long) is entered by hand.

On the weekend, I finally had a chance to load my three credit cards into Apple Pay. The process was slick and painless, as you’d expect from Apple: a simple snap of the credit card auto-populated the data on my phone. Only the card security code (three or four digits long) is entered by hand.

Snippet: For decades, the financial services industry has relied on one-time passwords (OTPs) for online user authentication. While OTP technology was state-of-the-art in the 1980s, technology has evolved, and the changes in computing power, the Internet, and the advent of mobile technology has rendered it no match for today’s most common fraud schemes.

For decades, the financial services industry has relied on one-time passwords (OTPs) for online user authentication. While OTP technology was state-of-the-art in the 1980s, technology has evolved, and the changes in computing power, the Internet, and the advent of mobile technology has rendered it no match for today’s most common fraud schemes.

Snippet: Last month, Apple’s iCloud fell victim to a major security breach that left many people, especially celebrities, exposed. Our lives are increasingly conducted through our smartphones and our data is then backed up to the cloud, so it’s not surprising that criminals are showing interest in hacking the system.

Last month, Apple’s iCloud fell victim to a major security breach that left many people, especially celebrities, exposed. Our lives are increasingly conducted through our smartphones and our data is then backed up to the cloud, so it’s not surprising that criminals are showing interest in hacking the system.

Snippet: Do you have any idea how many accounts and passwords you’ve used? I am not just talking about your bank, email and social media accounts, but also all the passwords for the online stores that you’ve bought from (even if only once in the last 10 years), the subscriptions you’ve taken out and the online services you’ve used.

Do you have any idea how many accounts and passwords you’ve used? I am not just talking about your bank, email and social media accounts, but also all the passwords for the online stores that you’ve bought from (even if only once in the last 10 years), the subscriptions you’ve taken out and the online services you’ve used.

Snippet: Google announced today that it is enabling support for the FIDO Alliance’s Universal Second Factor (U2F) protocol on all Google user accounts. This makes it the first major company to do so. Entersekt thinks this a fantastic development and one we are very proud to be a part of.

Google announced today that it is enabling support for the FIDO Alliance’s Universal Second Factor (U2F) protocol on all Google user accounts. This makes it the first major company to do so. Entersekt thinks this a fantastic development and one we are very proud to be a part of.

Snippet: Announcements by Samsung and Apple that they are offering developer access to fingerprint biometrics as a form of identification and authentication have received a lot of media attention. Using your fingerprint or voice as a means of identification is a pretty cool idea.

Announcements by Samsung and Apple that they are offering developer access to fingerprint biometrics as a form of identification and authentication have received a lot of media attention. Using your fingerprint or voice as a means of identification is a pretty cool idea.

Snippet: Who is legally liable when cybercriminals break into a network and steal hundreds of thousands of dollars from a company? If you follow recent court cases, businesses and banks point the finger at one another.

Who is legally liable when cybercriminals break into a network and steal hundreds of thousands of dollars from a company? If you follow recent court cases, businesses and banks point the finger at one another.

Entersekt Logo

Entersekt is an innovator of customer-centric fintech solutions. Financial services providers and other enterprises rely on our patented mobile identity system to provide both security and the best in convenient new digital experiences to their customers, irrespective of the service channel. With us, they can concentrate on their innovation roadmap, while delivering intuitive, low-friction digital experiences to their customers.