Security tactics like facial recognition have been challenged by all the mask-wearing during the pandemic. What are companies doing instead, and what other ways has COVID-19 changed security?
Key Takeaways- Facial recognition is not as effective with mask-wearing, but companies are already creating new algorithms to keep up.
- Organizations in industries such as transportation are using surveillance to monitor for compliance with safety measures.
- Cybercriminals are taking advantage of vulnerable organizations that had to quickly implement digital transformation when the pandemic began.
1. Facial recognition changes
Facial recognition has been adopted by many industries, from government to transportation to cellular device manufacturers. The success of the technology depends on algorithms that detect a person’s unique facial features for identification purposes, and it has been widely accepted as an avenue to increase security across a range of organizations. But COVID-19 has led to more people across the globe wearing masks as many governments have required people to wear them, especially when entering businesses. Masks generally cover at least half of the face, which created a problem for facial recognition algorithms. One study from the National Institute of Standards Technology (NIST) found that the error rate for these algorithms was between 5% and 50% when the subject wore a face mask. The more of the face covered, the more errors were found in identifying individuals. Some companies are already creating new algorithms that can identify people based on just the top portion of the face so facial recognition will work even with large populations wearing masks. For example, the company Facewatch launched a new algorithm that can recognize people based on the eye area between cheekbones and eyebrows. Apple has also recognized the difficulty in facial recognition and recently announced that iPhone users will be able to unlock their devices while wearing a face covering using a technology that works in conjunction with the Apple Watch. Similar algorithms were in development for facial recognition companies before COVID to address challenges identifying individuals wearing sunglasses, hats, or other coverings. No doubt, as the pandemic continues and mask-wearing may become a more permanent part of life, facial recognition techniques will have to adapt and become more advanced to stay effective.2. Mask enforcement with surveillance
Aside from the security challenges due to limited facial recognition, new security measures are being used to identify people who are not wearing a mask in areas where one is required. Airlines, for example, are using surveillance technology to identify people not complying with mask-wearing mandates on flights and in airport waiting areas. These technologies can also identify whether people are social distancing properly in these spaces. Organizations like retail shops, restaurants, and hotels are also starting to experiment with technologies that monitor mask-wearing. One example is Cyberlink FaceMe, which can detect if a person has a mask on and even if it is being worn properly, covering the mouth and the nose.3. COVID-19 and cybersecurity
Facial recognition isn’t the only aspect of security that has changed because of the pandemic. Cybersecurity has had to adapt as well, primarily because more companies around the world are working in remote environments. This requires new measures to protect sensitive company information, employee communication, and how enterprise systems are managed. When so many new systems have to be implemented quickly, as happened when the COVID-19 shutdowns were implemented in 2020, many vulnerabilities may not be addressed effectively. Attackers know to take advantage of chaos and confusion caused by quick transitions. Data breaches on a large scale saw a 273% spike in the first quarter of 2020 compared to the first quarter of 2019. IT staff at a variety of companies and organizations have had to implement new ways to take on security tasks like the following:- Authenticating users from remote locations
- Securing many different devices that now need access to shared systems
- Embracing human error while implementing better security controls
- Reevaluating appropriate levels of access across the company
- Effectively monitoring for threats across all these moving parts