Saturday, 30th May 2020

EMA’s research highlights the importance of context-aware security and zero password authentication

MobileIron has published the results of a research report that found passwords remain the dominant method of authentication and top cause of data breaches. The report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user.

MobileIron sponsored the EMA report, “Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security effectiveness,” to identify the requirements, challenges, value, and optimal approaches for implementing context-aware identity and access management (IAM) platforms. EMA surveyed 200 IT and security managers and looked at arangeof IAM technologies.

“The digital workplace is driving transformation within organizations of all sizes as employees are increasingly accessing business apps and data from locations outside of their offices and homes,” said Steve Brasen, research director of endpoint and identity management at EMA. “At the same time, mobile threats are increasing. More than 60 percent of respondents indicated their organization had experienced a security breach in just the last year. Organizations need to implement context-aware security and passwordless authentication to dynamically adapt to modern threats while removing the friction that is inhibiting end user productivity.”

The report reinforced that it’s time to make passwords a thing of the past. Below are a few key findings:

  • The username/passwordcontinues to bethe dominant method of authentication used to access business devices, apps and data.
  • The password is still the top attack vector for organizations of all sizes, with 42% of respondents indicating their organization had been breached as a result of a user password compromise.
  • Poor password hygiene is also a top cause of data breaches, with 31% of respondents indicating their organization had been breached as a result of user credentials being shared with an unauthorized peer.
  • Phishing attacks, which are designed to harvest employee credentials, are prevalent. Twenty-eight percent of respondents indicated their organization had been breached as a result of a successful phishing attack.
  • IT and security managers are most confident in the ability of hardware tokens/security keys, thumbprints, and mobile devices to prevent access-based security breaches, compared to other authentication methods like passwords and PINs.

“We all know that passwords are antiquated and open us up to even more cyber threats,” said RhondaWhite, Chief Marketing Officer at MobileIron. “Organizations urgently need to replace passwords with a secure and frictionless alternative.Making mobile devices the primary form of authentication to enterprise cloud services provides the best user experience for employees and significantly reduces the risk of data breaches for security leaders.”

Attackers using COVID-19 pandemic to launch attacks on vulnerable organisations.
The C-Suite Report: The Current and Future State of Cybersecurity sponsored by Forcepoint reveals le...
The joint offering combines the expertise in Identity and Governance Administration from Omada with...
Third annual report details how financial CISOs are battling ransomware, wire fraud transfer, island...
Acquisition will extend value of Privileged Access Management and further CyberArk’s SaaS-delivered...
Access Suite Plus offers simplified, modular Secure Access for hybrid IT with Zero Trust control.
New log streaming capabilities deliver 10x the amount of logs for enhanced monitoring and alerting.
As businesses seek to recover and respond to a changing environment in the wake of COVID-19, service...