CISOs looking to beef up their customer-facing authentication procedures to thwart cyberattacks need to walk a fine line. You want the method to provide tight security without being too complicated, confusing, or onerous for end users. You also need to be mindful of privacy concerns, particularly when it comes to approaches like challenge questions or facial recognition.
Selecting the most appropriate authentication method for your customers is something of a moving target because consumer attitudes are always changing.