sb-nz logo
Story image

92% of businesses experience identity challenges - LastPass

15 Jul 2019

LastPass by LogMeIn has announced the results of a new study conducted by Vanson Bourne to offer businesses insights into the state of identity and access management (IAM) and actionable steps to improve their IAM programme.

The study, The Guide to Modern Identity, surveyed 700 global IT and security professionals at organisations ranging from 250 to 2,999 employees and found 92% are experiencing at least one challenge when it comes to identity management, with 47% citing ease of use with security as the biggest challenge. 

Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks, citing incorrect access controls (41%), loss of employee data (36%) and loss of customer data (33%) as the biggest consequences. Despite this, many have not implemented an adequate identity management solution.

Additional findings include:

Passwords continue to cause frustration and risk

IT teams continue to spend valuable time and resources dealing with tickets for password-related problems.

On average, IT security teams spend four hours per week on password management-related issues alone and receive 96 password-related requests per month.

Given the ongoing resource drain that passwords pose to organisations, almost all (95%) of IT security professionals surveyed report that their organisation should place more emphasis on the importance of strong password behaviour.

Single Sign-On serves a crucial role – but leaves critical gaps in isolation

Given the risks and resource drain associated with passwords, SSO solutions offer the benefits of eliminating passwords for IT-supported apps and simplifying the login process for employees accessing key apps in the cloud and behind the firewall.

However, many apps aren’t integrated into an SSO solution – whether because they don’t support SSO, they’re not high enough priority for IT to configure SSO or IT doesn’t even know they’re being used.

Although our research shows that 80% of IT professionals agree that relying on SSO alone is not enough, as it still leaves a variety of cloud apps and privileged accounts unsecured.

Upgrading identity capabilities is a top priority 

98% of IT professionals surveyed see room for improvement in the general security behaviour of their employees (creating strong passwords, ensuring secure sharing and collaboration).

Due to competing priorities, IT teams are struggling to address their security needs.

When asked about next year’s IT security objectives, 65% agree that upgrading their Identity and Access Management capabilities is a priority.

When asked for ideal features in an identity solution, respondents noted multi-factor authentication (55%), integration with current infrastructure (52%), a built-in password generator (44%), support for both legacy and cloud apps (44%) and an integrated system for managing, monitoring and setting policies (44%).

Strengthening user authentication with MFA is critical

Among the key priorities for improving identity capabilities, 59% of IT professionals agree that strengthening user authentication with MFA technology is critical.

IT security professionals from organisations that have invested in or plan to invest in MFA see the most likely benefits as greater organisational security (60%), fewer instances of incorrect access to confidential information (48%) and decreased risk of credential/ password theft (47%).

Additionally, 36% of respondents see implementing biometric MFA as a priority.

Balancing ease of use and security is a challenge when implementing an identity solution

Given that security is a high priority for most businesses, it’s no surprise that many are investing in identity solutions.

Less than one% of IT professionals believe that managing user access is unimportant to the overall security of the organisation.

Unfortunately, 92% of organisations also say they are experiencing at least one challenge when it comes to identity management.

The average organisation struggles with three identity-related challenges: 47% of respondents said balancing ease of use with increased security was a hurdle, 40% cite the general security of their solutions and 37% are facing demands from employees for a solution that’s easy to use.

“When used individually, enterprise password management, SSO, and multi-factor authentication, all bring unique security and productivity benefits to a business,” says LogMeIn identity and access management business unit general manager John Bennett.

Link image
Need better security now your workforce is remote? Get it for free
Remote working comes with all kinds of cybersecurity risks. Protect your business by leveraging multi-factor authentication, biometrics and push notification software for free.More
Story image
Cyclone named essential NZ supplier for online learning devices
The Ministry of Education has selected Cyclone as one of a handful of essential business suppliers for devices and technologies used in distance and online learning.More
Story image
80% of cyber threat landscape uses COVID-19 as leverage - report
A report released recently by Proofpoint reveals the extent to which cyber attackers are capitalising on fear and paranoia surrounding the pandemic, with instances of coronavirus-themed attacks increasing every day.More
Story image
Techday introduces RemoteWorkerTech Asia site
This is a new site dedicated to covering the latest technology, expert opinions and trends around remote working.More
Story image
Marriott International reports breach affecting 5.2 million customers
Marriott said in statement that an ‘unexpected’ amount of guest information may have been accessed in mid-January this year, using the login credentials of two employees at one of the company’s franchise properties.More
Story image
Zero trust security gaining momentum as a cybersecurity model
The model is centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything trying to connect to its systems before granting access, according to CSO.More