EMA’s research highlights the importance of context-aware security and zero password authentication

MobileIron has published the results of a research report that found passwords remain the dominant method of authentication and top cause of data breaches. The report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user.

  • 4 years ago Posted in
MobileIron sponsored the EMA report, “Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security effectiveness,” to identify the requirements, challenges, value, and optimal approaches for implementing context-aware identity and access management (IAM) platforms. EMA surveyed 200 IT and security managers and looked at a range of IAM technologies.  

 

“The digital workplace is driving transformation within organizations of all sizes as employees are increasingly accessing business apps and data from locations outside of their offices and homes,” said Steve Brasen, research director of endpoint and identity management at EMA. “At the same time, mobile threats are increasing. More than 60 percent of respondents indicated their organization had experienced a security breach in just the last year. Organizations need to implement context-aware security and passwordless authentication to dynamically adapt to modern threats while removing the friction that is inhibiting end user productivity.”

 

The report reinforced that it’s time to make passwords a thing of the past. Below are a few key findings:

  • The username/password continues to be the dominant method of authentication used to access business devices, apps and data.
  • The password is still the top attack vector for organizations of all sizes, with 42% of respondents indicating their organization had been breached as a result of a user password compromise.
  • Poor password hygiene is also a top cause of data breaches, with 31% of respondents indicating their organization had been breached as a result of user credentials being shared with an unauthorized peer.
  • Phishing attacks, which are designed to harvest employee credentials, are prevalent. Twenty-eight percent of respondents indicated their organization had been breached as a result of a successful phishing attack.
  • IT and security managers are most confident in the ability of hardware tokens/security keys, thumbprints, and mobile devices to prevent access-based security breaches, compared to other authentication methods like passwords and PINs.  

 

“We all know that passwords are antiquated and open us up to even more cyber threats,” said Rhonda White, Chief Marketing Officer at MobileIron. “Organizations urgently need to replace passwords with a secure and frictionless alternative. Making mobile devices the primary form of authentication to enterprise cloud services provides the best user experience for employees and significantly reduces the risk of data breaches for security leaders.”

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Trend Micro has released new research detailing the murky cybercrime supply chain behind much of...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...
State of Industrial Cybersecurity report reveals only 21% of organizations achieved full maturity...