Protecting Digital Identities and Devices

By Samuel Greengard
  • Previous
    Dangerous Logons

    Dangerous Logons

    81% of U.S. respondents claimed to access secure corporate data from a mobile device, and 15% admitted to staying logged in at all times, creating a significant security concern.

Over the last few years, news about data breaches and breakdowns has reached pandemic levels. In many instances, the culprit is the ubiquitous password, which is increasingly ineffective in protecting digital identities and securing digital devices. A new study conducted by identity and credential management firm Intercede U.S. offers insights into the problem—and the way consumers, employees and others think about and approach digital identities. Part of the problem, according to the report, "The Rise of the Identity Centric Economy," is that workers are put off by logging into secure business apps due to the perceived weakness of their network security, and many are frustrated by long, complicated passwords. What's more, "Many employees are oblivious to their employer's BYOD policy, unnecessarily putting sensitive corporate data at risk," points out Richard Parris, CEO of Intercede. "Fears about long, complex passwords and insecure network connections are hampering the growth of BYOD. The best approach is to turn mobile devices into secure authentication devices, which act as the first line of defense to protect corporate data. Companies must act quickly and robustly to employ effective BYOD policies while protecting their own data, or risk major security incidents." The following slides provide some highlights from the study.

This article was originally published on 2014-12-30
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.