Call us today! (866) 295-3106

Schedule an appointment

Call us today! (866) 295-3106

Video: Are Biometrics the Future of Information Security?

Are you ready for the next generation of secure digital logins? We’re not talking about complicated and convoluted passwords. We’re talking about biometrics.

With increasing frequency, airports, corporations, financial institutions, and government agencies are exploring the use of one-of-a-kind biometric characteristics, unique to each individual, to confirm identities and protect sensitive information and networks. That means in the near future, consumers may be asked to confirm facial characteristics, retinas, fingerprints, vocal inflections and even DNA before access to confidential data is granted, someone is allowed to board an airplane, or cash can be withdrawn for the weekend.

As you can see in the video below, by 2019, it is projected that more than 770 million bio-related apps will be in use.

Want to be part of this exciting, next phase of information security?

Information Security Managers, Security Analysts and Engineers, Database Architects and Developers, Digital Forensic Specialist, Information Security Officers, Firewall Engineers and Ethical Hackers are all in high demand across nearly every industry as organizations seek ever-more sophisticated methods to protect data, networks and identities.

If one of these career paths appeal to you, consider Utica College’s Master of Science in Cybersecurity. The program includes five areas of specialization – Intelligence, Computer Forensics, Cyber Operations, Electronic Crime, and Malware Analysis – and can position you to be one of the good guys in managing cybercrime.

Want to know more? Request more information or call Utica College at 315.732.2640 or toll-free at 866.295.3106.

Video Transcript: Are Biometrics the Future of Information Security?

NARRATOR: Are biometrics the future of information security? The apartment building you live in has a parking garage guarded by fingerprint access. In your parking spot, your jet black SUV unlocks itself with your voice so you can take your kids to school. During their lunch, they pay through a hand geometry scanner.

By 2019, we will start to see more than 770 million biometric apps downloaded each year on mobile devices. That represents a 128 times increase from 2015. This exponential growth makes it easy to see how the mobile industry will become a driving force for biometric security in everything we do. But how can it be used? Where will we encounter it?

In the airport instead of using your driver's license to check in for your flight, airport security might use a facial scanner. Those security agents are using biometrics as they clock into work through an iris scanner. At blood banks you can put away your outdated blood donor card and use your fingerprint as it unlocks access to a database that contains your vital information. Even segments of your DNA found in your blood can be analyzed to find your safely stored information.

With your bank, you can avoid having to remember another password as your voice can be the key to unlock your next bank statement. Our governments can even use it to control access to high security documents and buildings. Lawyers might submit incriminating evidence to the court through signature recognition. The possibilities seem endless.

As we see technology evolve, biometrics does the same. With our hands, odor, fingers, retinas, voice, facial characteristics, and signatures, biometrics can secure facilities, computer networks, and even fight crime to keep our community safe. As biometrics keeps evolving through new forms of technology, so does the demand for highly educated people to drive its growth. So how will you contribute?

Request more information or call Utica College at 315.732.2640 or toll-free at 866.295.3106.

Free Cybersecurity Career Guide

You may also be interested in this Cybersecurity Career Guide which provides an overview of the careers available for cybersecurity professionals.

Free Guide to find out what careers are available for cybersecurity professionals