by Brianna Crandall — October 26, 2016 — SecureAuth Corporation, a provider of adaptive access control, recently released results of an online survey revealing industry perspectives on passwords and authentication. Commissioned in conjunction with Wakefield Research, the responses surveyed more than 200 information technology decision-makers (ITDMs) in the United States. Among the findings, the survey revealed that 69% of organizations are likely to do away with passwords within the next 5 years.
Craig Lund, CEO of SecureAuth, commented:
On the heels of recent mega breaches such as Yahoo!, in which usernames, passwords and security question responses were compromised, there’s a growing movement from individuals and businesses for an authentication overhaul. Single-factor, password-based authentication — and even many traditional two-factor approaches — are no longer enough in today’s increasingly digital world. And with costs associated with cyberattacks totaling millions of dollars a year, it’s in everyone’s best interest to make it more difficult for attackers to cause further damage to our economy.
Stolen credentials are at the core of a startling number of breaches, points out SecureAuth. According to the 2016 Verizon Data Breach Investigations Report, 63% of the attacks it studied leveraged weak, default or stolen credentials at some point in the attack, indicating that organizations must implement stronger forms of authentication to hinder the rising tide of credential abuse.
The Wakefield survey found that organizations on average are only protecting 56% of their assets with multi-factor techniques. When asked why they had not yet made improvements to their authentication strategy, Wakefield respondents cited resistance from company executives and disruption to users’ daily routine as the top hindrances — tied at 42%. Other reasons for not adopting an improved authentication strategy include:
- Lack of resources to support maintenance — 40%
- Steep employee learning curve — 30%
- Fear the improvements would not work — 26%
While companies are learning that password-only policies leave their organizations vulnerable, many IT decision-makers and C-level executives are still hesitant to evolve and update their authentication strategies. It’s a tough balancing act — organizations must confirm user identities with the strongest forms of access control while also balancing a positive and non-intrusive user experience. Fortunately, user-friendly adaptive access technologies such as device recognition, threat services, and geo-location look-up, when used in layers, helps strengthen any organization’s security posture, enabling users to stay both secure and productive with minimal disruption to their daily routines.
Authentication fact and fiction
The survey revealed that nearly all (99%) of respondents agree two-factor authentication is the best way to protect an identity and its access. However, recent news has shown that many traditional two-factor authentication methods, such as SMS-based one-time passwords, are being circumvented by attackers in well-crafted phishing attacks. Illustrating this inherent risk, the National Institute of Standards and Technology (NIST) recently announced a proposal to no longer recommend two-factor authentication using SMS delivered one-time passcodes as an out-of-band authentication method. Indeed, basic two-factor authentication alone is no longer enough — and it is time for companies to adapt, says SecureAuth.
Furthermore, the majority (73%) of Wakefield respondents cited security questions or knowledge-based authentication (KBA) as the most essential measure for a company to authenticate its users securely. However, attackers often compromise these security questions and answers, greatly increasing an individual’s exposure to cybercriminal attacks. Responses to some security questions can also be gleaned from social media sites, social engineering attacks and even a cybercriminal’s educated guess.
Encouragingly, other measures deemed essential by ITDMs for their organization’s authentication strategy include: device recognition (59%); a biometric, such as fingerprint, facial or iris scans (55%); one-time passcodes (49%); and geo-fencing, geo-location or geo-velocity capabilities (34%).
Keith Graham, CTO of SecureAuth, concluded:
Organizations are using outdated authentication approaches that require extra steps for users, and are ineffective against today’s advanced attacks. Legacy two-factor approaches to authentication are no longer enough, and organizations must evolve and strengthen their defenses against cyber adversaries. Those that are forward thinking are implementing modern, behind-the-scenes adaptive risk checking that increases security while not getting in the way of the end-user experience. Strong security during authentication no longer has to be at the expense of the end user — users and organizations can now have both.
For the latest insights on adaptive access control, follow the SecureAuth blog.