Guest Post | Advt. | Query:

The password’s pulse beats on – Hackers still one step away from your information

New research from SecureAuth reveals two in five (39%)  IT decision makers in the UK admit that passwords are their only IT security measure

  •  A third (33%) of companies with more than 1,000 employees are still using password only access
  • 45% of public sector organisations use password only based security
  • Half (54%) are concerned that employees could compromise access to their corporate network
  • A third (33%) of employee’s time is spent accessing the organisation’s IT network remotely
  • A third (28%) of IT decision makers believe businesses will use biometrics as an IT security access measure in 5 years’ time

 London, 18th March 2015 – New research from access control innovator, SecureAuth, shows that despite much debate, the password isn’t dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT security measure. It is a worrying revelation, considering the prevalence of security breaches due to compromised credentials.  Furthermore, a third (33%) of companies with more than 1,000 employees are still using password only access.  Even more concerning, one in five (20%) respondents said they ‘don’t know’ how many IT security policies their company currently has.

 The entertainment, hospitality and leisure industry is taking the most risks with its data as two thirds (65%) of respondents from this sector admit their organisations only use passwords as a security method.  Additionally, almost half (45%) of ITDMs from public sector organisations revealed they also only use passwords – a concern considering organisations in this sector are responsible for protecting the public’s sensitive information.

It appears that organisations in all sectors aren’t always aware of the inherent risks of using password-only access, with over half of businesses (54%) requiring their staff to change passwords less frequently than every two months.  Almost a quarter (24%) admit that passwords are changed less than two to three times a year.

Despite companies relying on passwords alone, the survey revealed that the majority of ITDMs (63%) are confident that their current authentication methods are effectively protecting valuable assets.

Those in the IT and Telecoms industry were the most clued up on methods of protecting their data with almost three quarters (74%) stating that they don’t use solely password-based security.

“It’s extremely concerning just how many businesses still use passwords as their only method of protection against malicious hackers and the false confidence they seem to have in their current security systems is only further cause for concern,” commented Nick Mansour, Executive Vice President of Worldwide Sales at SecureAuth.

“Over the last 12 months, there have been an incredible number of data breaches occurring where lax access controls and the theft of credentials have played a key part in the loss of sensitive data.  These organisations who are continuing to blindly use passwords alone to secure their corporate networks need to wake up to the fact that there are a number of inherent risks that come with relying on using passwords to protect valuable data.  Organisations of all sizes, from all sectors, should be doing more to address these issues,” continued Mansour.

The threat from within

Businesses are not just facing threats from outside the organisation but also from within.  More than half (54%) of respondents said that they are most concerned that employees could compromise access to their corporate network, whether intentional or not.  However, one in five (21%) ITDMs in the manufacturing industry believe that suppliers and partners pose the most risk to the corporate network.

The flexible working model and BYOD are becoming more commonplace, with two in five (42%) respondents claiming that employees are now accessing corporate systems through three or more devices and a third (33%) of an employee’s time is spent accessing the organisation’s IT network remotely – the equivalent of at least 612.3 hours a year* per business worker.  However, despite the popularity of remote working, almost one in five (17%) organisations don’t see the need for additional access control and have just one method in place and 44% of respondents stating that their organisation has two or fewer methods in place to deal with remote access.

The survey also revealed an almost even split in which resources ITDMs are the most concerned about protecting.  Almost a third (28%) stated that protecting on premise applications is a top priority, closely followed by 29% citing that they are most concerned about safeguarding the company’s Virtual Private Network (VPN).  One in five (20%) stated Cloud and SaaS is the most important company resource to protect and 18% said mobile takes precedence.

However, the research indicated that different sectors have different priorities – ITDMs in the manufacturing industry are the most concerned about mobile access (24%) but those in the public sector are far more concerned with VPN access (29%) and one in five ITDMs (22%) in the professional and financial services sector claim they are most concerned about cloud and SaaS access.

Access controls and the future

Less than half (44%) of respondents have plans to change or enhance their security model in the next two years with just over one in ten (12%) stating they don’t know if they’re planning to change their current access methods – suggesting that IT access security is not keeping pace with the increasingly sophisticated ways in which criminals are targeting enterprises.

As biometrics become more commonplace on our smartphones and tablets, nearly a third (28%) of IT decision makers believe that businesses will use this as a security measure in 5 years’ time.  The survey indicated that it will take 5 years before we see a significant shift in organisations’ reliance on passwords alone and passwords and tokens.  Respondents expected to see a 62% drop in the use of passwords alone and a 58% drop in passwords and tokens.  However, a quarter (24%) said that they ‘don’t know’ what the future will hold for authentication.

Mansour continues, “We’ve seen many instances of companies not being stringent enough with their security access control and what’s becoming clear is that organisations are slow to adapt to the demands of the ever changing IT landscape.  As the skills of hackers continue to evolve, organisations are going to have to wise up to new methods of information access security, such as adaptive authentication which can leverage real time threat intelligence, biometrics and even behavioural analysis.  The findings of this survey confirm there is a huge need for businesses to adopt more modern access control strategies if they want to ensure their sensitive data remains safe, both now and in the future.”

The research

The research, conducted by Opinium for SecureAuth, studied the approach businesses have to their IT security and access control and all figures, unless otherwise stated, are from Opinium.  Total sample size was 500 IT decision makers in organisations in the UK with 50 or more employees.  Fieldwork was undertaken between 20th February and 4th March 2015.  The survey was carried out online.

 *Based on an average 8 hour working day and 233 working days a year excluding bank holidays and 20 days annual leave

Have any Question or Comment?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

…… ……. … …

……… …. …….

….. …… ………

……. ….. …….

.. ……. …….. 0

buy! buy! CHEAP! Telefonie VoIP CHEAP! buy! buy! CHEAP!

.. ……. …….. .

buy! buy! CHEAP! Telefonie VoIP CHEAP! buy! buy! CHEAP!


……. ….. ……..


For the 2012 MLB period, we found an totals forecast Joao’s Renowned Over/Under João Zorro Gonçalves, Zcode Totals Pro, System of the time with progressions that have been successful over 98 98% ... We eventually perfected our over/under program ( Zcodesystemexclusive ), although it h-AS has brought years of investigation. Five Steps to Making a Winning MLB Method: 1. Execute appropriate cash management tools. 2. MLB rules that are comprehend. 3.Extensive testing back to make sure successful longterm results ...


There is always a challenge when you're dealing with the Foreign Exchange Market. That's just the nature of the beast. The best thing you can do is to learn about how the market operates as a whole so that you will be ready to meet these challenges. iq option penipu Never be misled by any profit gains in binary options. This is the number-one way traders end up losing their money and ultimately failing. Remember that the same things that make you laugh can make you cry in this market, and you can lose that $700.


Learning Polish has never been this fun and easy as with our podcasts Learn Polish with Polishpod101 Start today and become conversational in Polish in no time


The Best Website Agen Poker Resmi Terpercaya come join


Do you need edmonton phone systems service ? Call complete communications today!


High-tech solutions for easy start-up of your IPTV/OTT-business



If you want to purchase not only one item, you have a chance to enjoy privileges. There is a sale’ tab on the site which offers a fantastic range of reduced counterfeit watches and accessories, such as sunglasses, cufflinks, watch straps and pens. Luxury Jewelry Replica At MCA.MN On Sale You get a 5% discount if you buy two pieces, this discount increases to 10% if you buy 4 pieces or more. There is free international shipping on all orders on this site. We also offer customers a free return anytime with a 100% money back guarantee.