Featured

Gemalto Global Study Reveals Security Concerns over Convergence of Personal and Workplace Identities

Identity theft accounts for 64% of all data breaches across the globe, and consumer service breaches continue to rise, resulting in almost nine in ten (89%) enterprises addressing their access management security policies

90% of IT professionals are concerned about employees using their personal credentials for work purposes

62% of enterprises feel increasing pressure to match consumer authentication methods in the workplace

The use of two-factor authentication is on the rise, with 40% of organizations’ employees using it

Gemalto (www.Gemalto.com), the world leader in digital security, today released the findings of its Authentication and Identity Management Index, which revealed that 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with two thirds (68%) saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto’s research suggests that personal applications (such as email) are the biggest worry to organizations.

Convergence of Personal and Workplace Identities

The enterprise and consumer worlds are merging closer together, with enterprise security teams under increasing pressure to implement the same type of authentication methods typically seen in consumer services, such as fingerprint scanning and iris recognition. Six in ten (62%) believed this was the case, with a similar amount (63%) revealing they feel security methods designed for consumers provide sufficient protection for enterprises. In fact, over half of respondents (52%) believe it will be just three years before these methods merge completely.

Consumer breaches impacting enterprise security

Identity theft accounts for 64% of all data breaches across the globe [1], and consumer service breaches continue to rise, resulting in almost nine in ten (89%) enterprises addressing

their access management security policies. Half of enterprises have implemented extra training (49%) to allay their security concerns, 47% increased security spend, and 44% allocated further resources.

Employee expectations around usability and mobility are affecting how enterprises approach authentication and access management.  Nearly half of respondents stated that they are increasing resources and spending on access management. Deployment rates are also increasing:  62% expect to implement strong authentication in two years’ time – up from 51% of respondents who said the same thing last year, and nearly 40% responded they will implement Cloud SSO or IDaaS within the next two years.

Enterprises are clearly seeing the benefits, with over nine in ten (94%) using two-factor authentication (http://APO.af/59rCMK) to protect at least one application and nearly all respondents (96%) expecting to use it at some point in the future.

Mobility security still a challenge

As more enterprises become mobile, the challenges in protecting resources while increasing flexibility for employees working on the move increases. Despite an increasing amount of businesses enabling mobile working, a third (35%) completely restricted employees from accessing company resources via mobile devices and nine in ten (91%) are at least part-restricting access to resources. This is backed up as half of businesses (50%) admit security is one of their biggest concerns to increasing user mobility.

In order to protect themselves against threats from increased mobility, enterprises are still most likely to be using usernames and passwords – two thirds of users at respondents’ organizations are using this authentication method, on average. Currently, 37% of users at respondents’ organizations are required to use two-factor authentication to access corporate resources from mobile devices, on average. However, like the rise for access while in the office, on average, respondents believe this will increase to over half (56%) in two years’ time.

From credential sharing to authentication practices, it’s clear that consumer trends are having a big impact on enterprise security,” said François Lasnier, Senior Vice President, Identity Protection at Gemalto. “But businesses need to make sure their data isn’t compromised by bad personal habits.

It’s encouraging to see deployment of two-factor authentication methods on the rise, and increased awareness for cloud access management (http://APO.af/8eGn3O), as these are the most effective solutions for businesses to secure cloud resources and protect against internal and external threats. For IT leaders, it’s important that they keep pushing for security to be a priority at the board level, and ensure that it’s front of mind for everyone in an organization.”

Innov8tiv.com

Innov8tiv is a dynamic Web source for technology news, resources and innovation, with a special focus on the entrepreneurial advances of Africans on the continent as well as in the Diaspora. This site seeks to not only inform consumers and companies about the latest in tech trends and ideologies, but to shed light on a phenomenon often ignored: the inventive, life-changing and creative engine that exists in Africa and among leaders of color around the world, including the UK, the Caribbean, Australia, and Asia. Send story ideas to info@innov8tiv.com

Recent Posts

What makes a Healthy Environment at the WorkPlace

It takes a mix of different resources to set up and successfully run a business.…

3 hours ago

Headphones For Streaming Movies And Shows – A Quick Guide

Looking for a new pair of headsets to accompany you on your road trips or…

7 hours ago

Why is Heart Health Insurance being a Must for You?

Image by Gordon Johnson from Pixabay When it comes to your health, there should be…

10 hours ago

ETH2 Myths – True or False?

The release of ETH 2.0 is one of the most anticipated events on the crypto…

10 hours ago

How to Outsource Image Moderation

Allowing user-generated content is an effective way of engaging your audience. Customers are able to…

10 hours ago

Things You Need to Consider Before Buying a Projector: Simple Tips

Have you ever been to a presentation where the projector was not working? It can…

11 hours ago