Your Biggest Security Threat is the Least Complex to Address

Poor Password Hygiene is a Major Security Threat

Every day we guide clients in their pursuit of data security. Depending on the use case this guidance focuses on digital forensics, endpoint security, intelligence and data encryption. Can some of this technology be complex? Yes. Do all data security solutions need to be complex? NO.

Let’s take IAM or password security. If you’re considering a total, holistic answer for IAM you’re should be considering a FULL IAM solution which consists of: PAM, SSO and Password Manager. But what if your environment does not need a FULL IAM approach? What if your team doesn’t have the skill set or the budget is not available for a full IAM? The best answer is to look at a password security/management technology.

Password security is not a complex technology and it addresses the 3 main concerns you should have when it comes to access management: Security, reliability and ease of use

Why consider a password security/management technology?

Take a look at some alarming stats on the threat of poor password hygiene:

Employees use

  • weak passwords

  • reuse them across accounts

  • forget them

81 % of data breaches are due to weak, default or stolen passwords 1

80 % of people use the same password for everything 2

50 % of help desk calls are password related 3

Nearly 50% of organizations cannot maintain control of password security 4

Average security score for 43,000 companies being 52 out of 100 4

  1. Verizon 2017 Data Breach Incident Report
  2. Keeper Survey of 1000 Internet Users in 2017
  3. Gartner Group
  4. LastPass, 2018 Global Password Security Report

How Employees Manage Passwords

 Source: Forrester Data Global Business Technographics® Workforce Benchmark Recontact Survey, 2017

Source: Forrester Data Global Business Technographics® Workforce Benchmark Recontact Survey, 2017

The above data is disturbing. But, can be managed by the use of a password security technology. An added benefit: changing the employee behavior by letting the technology replace their need for managing passwords. You can have all the best processes and training in place, but people being people….