Protecting Digital Identities and Devices

 
 
By Samuel Greengard  |  Posted 2014-12-30 Email
 
 
 
 
 
 
 
 
 
 

Over the last few years, news about data breaches and breakdowns has reached pandemic levels. In many instances, the culprit is the ubiquitous password, which is increasingly ineffective in protecting digital identities and securing digital devices. A new study conducted by identity and credential management firm Intercede U.S. offers insights into the problem—and the way consumers, employees and others think about and approach digital identities. Part of the problem, according to the report, "The Rise of the Identity Centric Economy," is that workers are put off by logging into secure business apps due to the perceived weakness of their network security, and many are frustrated by long, complicated passwords. What's more, "Many employees are oblivious to their employer's BYOD policy, unnecessarily putting sensitive corporate data at risk," points out Richard Parris, CEO of Intercede. "Fears about long, complex passwords and insecure network connections are hampering the growth of BYOD. The best approach is to turn mobile devices into secure authentication devices, which act as the first line of defense to protect corporate data. Companies must act quickly and robustly to employ effective BYOD policies while protecting their own data, or risk major security incidents." The following slides provide some highlights from the study.

 
 
 
 
 
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters