Tuesday, 7th April 2020

EMA’s research highlights the importance of context-aware security and zero password authentication

MobileIron has published the results of a research report that found passwords remain the dominant method of authentication and top cause of data breaches. The report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user.

MobileIron sponsored the EMA report, “Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security effectiveness,” to identify the requirements, challenges, value, and optimal approaches for implementing context-aware identity and access management (IAM) platforms. EMA surveyed 200 IT and security managers and looked at arangeof IAM technologies.

“The digital workplace is driving transformation within organizations of all sizes as employees are increasingly accessing business apps and data from locations outside of their offices and homes,” said Steve Brasen, research director of endpoint and identity management at EMA. “At the same time, mobile threats are increasing. More than 60 percent of respondents indicated their organization had experienced a security breach in just the last year. Organizations need to implement context-aware security and passwordless authentication to dynamically adapt to modern threats while removing the friction that is inhibiting end user productivity.”

The report reinforced that it’s time to make passwords a thing of the past. Below are a few key findings:

  • The username/passwordcontinues to bethe dominant method of authentication used to access business devices, apps and data.
  • The password is still the top attack vector for organizations of all sizes, with 42% of respondents indicating their organization had been breached as a result of a user password compromise.
  • Poor password hygiene is also a top cause of data breaches, with 31% of respondents indicating their organization had been breached as a result of user credentials being shared with an unauthorized peer.
  • Phishing attacks, which are designed to harvest employee credentials, are prevalent. Twenty-eight percent of respondents indicated their organization had been breached as a result of a successful phishing attack.
  • IT and security managers are most confident in the ability of hardware tokens/security keys, thumbprints, and mobile devices to prevent access-based security breaches, compared to other authentication methods like passwords and PINs.

“We all know that passwords are antiquated and open us up to even more cyber threats,” said RhondaWhite, Chief Marketing Officer at MobileIron. “Organizations urgently need to replace passwords with a secure and frictionless alternative.Making mobile devices the primary form of authentication to enterprise cloud services provides the best user experience for employees and significantly reduces the risk of data breaches for security leaders.”

The leading independent identity platform introduces intuitive, secure, passwordless access for end-...
The number of businesses suffering cybersecurity breaches or attacks is on the rise again after fall...
Egress global Insider Data Breach Survey reveals legal sector employees twice as likely to breach co...
Nearly three quarters (71%) of CIOs find new computing devices that they didn’t previously know abou...
Report finds that removing admin rights from endpoints would mitigate 77% of all Critical Microsoft...
Positive Technologies experts have analysed network activity of large companies (with over 1000 empl...
CISOs are motivated by being the ‘business bodyguard’ despite growing pressures on the job, new rese...
Auth0 acquires Apility.io to integrate IP reputation in Anomaly Detection capabilities; and launches...