One in four companies only use passwords as BYOD defence, research finds
Here’s a worrying security statistic in research released today by Bitglass: one quarter of organisations use passwords only for BYOD security.
The research, which took its cue from more than 200 IT and security professionals surveyed at a recent Gartner conference, found that external sharing was the leading cloud security concern for those polled, cited by 45%. Other security scares include malware protection (40%) and unmanaged device access (40%).
For those who do use multi-factor authentication to secure their BYOD processes, the most popular methods used include third party applications, cited by 42% of respondents, and SMS tokens (34%).
But what about other authentication methods? For many emerging technologies, organisations have problems. Three in five (61%) say they have reservations about Apple’s Face ID facial recognition tool as a viable method of BYOD authentication. Respondents added they were concerned about the accuracy of face detection – cited by 40% of those polled – as well as prevention of unauthorised access (30%) and speed of face detection (24%).
That said, even though passwords are patently not secure enough, many companies still struggle with that. Research conducted by OneLogin last month found a quarter of companies surveyed do not require user passwords to meet a minimum length requirement, while only half of companies enforce their employees to change passwords monthly.
“Enterprises often misjudge the effectiveness of traditional security solutions, many of which are readily bypassed,” said Rich Campagna, Bitglass CEO in a statement. “The BYOD boom exposes organisations to risks that can only be mitigated with data-centric solutions that secure access.”
- » Dealing with insider threats and keeping your enterprise secure: A guide
- » Forget facial recognition: Let’s use AI to help gauge integrity
- » Five secrets of successful CISOs: Communication, regulation, and more
- » The real state of DevSecOps: Checking on automation, speed, and accuracy
- » Enterprise mobility and security: How to build a BYOD policy