Story image

25% of firms fail to implement multi-factor authentication for BYOD

16 Feb 2018

As employees demand more flexibility in the workplace with the likes of Bring-your-own-device (BYOD), security policies may not be scratch, according to a survey of more than 200 IT and security professionals at the Gartner Symposium conference.

Data protection firm Bitglass conducted the survey as part of its BYOD and Identity research report. It found that 25% of organisations lack some form of multi-factor authentication when securing BYOD.

“Enterprises often misjudge the effectiveness of traditional security solutions, many of which are readily bypassed,” says Bitglass CEO Rich Campagna.

The company says that several high profile data breaches in recent months were caused by compromised passwords that were used to control access, as well as single-factor authentication. Because of challenges like these, organisations have turned to identity management.

“The BYOD boom exposes organisations to risks that can only be mitigated with next-gen, data-centric solutions that secure access,” Campagna continues.

The survey also gained insights about IT professionals’ views on facial recognition technology for secure mobile authentication – Apple Face ID in particular.

60% of respondents had reservations about Apple’s Face ID technology. Those reservations include accuracy of face detection (40%), prevention of unauthorised access (30%) and speed of facial detection (24%).

While passwords, PINS and fingerprint recognition are standard and familiar to enterprises, Bitglass says that facial recognition technologies remain unproven.

Respondents were finally polled about their top security concerns. External sharing was the leading concern (45%), followed by malware protection (40%) and unmanaged device access (40%).

Bitglass says these statistics indicate that organisations are doubling down on protecting data beyond the corporate network.

In another study, Bitglass also shared that 44% of scanned organisations had some form of malware in at least one of their cloud applications.

Microsoft OneDrive was most vulnerable with a 55% infection rate, while Google Drive, Dropbox and Box were not too far behind. 

“Most cloud providers do not provide any malware protection and those that do struggle to detect zero-day threats. Only an AI-based solution that evolves to detect new malware and ransomware can keep cloud data secure,” commented Bitglass VP of product management Mike Schuricht at the time.

“Malware will always be a threat to the enterprise and cloud applications are an increasingly attractive distribution mechanism.”

Earlier this month Bitglass appointed its first Asia Pacific vice president of sales, David Shephard. The company plans to capitalise on demand for cloud and mobile security in the region.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.