images
figures
Blog

Passwords Still Dominant Authentication Method, Top Cause of Data Breaches

Admin Globaldots
09.03.2020
image 1 Min read
Identity & Access Management (IAM)

Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user.

EMA surveyed 200 IT and security managers and looked at a range of IAM technologies.

The username/password continues to be the dominant method of authentication used to access business devices, apps and data.

The password is still the top attack vector for organizations of all sizes, with 42% of respondents indicating their organization had been breached as a result of a user password compromise.

Poor password hygiene is also a top cause of data breaches, with 31% of respondents indicating their organization had been breached as a result of user credentials being shared with an unauthorized peer.

Read more: Help Net Security 

Comments

0 comments

There’s more to see

slider item
Identity & Access Management (IAM)

How IT can Breeze through Onboardings without Additional Hirings

Dror Arie 25.11.21

Which IT Nuisance Would You Automate First? Employee onboarding is one of the heaviest, most complex operations on a company’s IT. This is especially true in fast-growing companies that may see multiple onboardings per day. And, of course, the wider a company’s software tools array, the more accounts to create and permissions to manage. In […]

Read more
slider item
Identity & Access Management (IAM)

GlobalDots Partners with Authentication Innovator Transmit Security

Li-Or Amir 16.11.21

GlobalDots keeps enriching its IAM (Identity & Access Management) innovation offering, and its Passwordless Authentication range in particular, with the latest addition of highly-valued unicorn Transmit Security. Only this June, Transmit Security announced a $543 million Series A – the largest series A funding round in cybersecurity history, according to Crunchbase. Transmit Security has developed an appless […]

Read more
slider item
Identity & Access Management (IAM)

Webinar: Feel the Breeze – How cool companies X10 their workforce zero-touch

Dror Arie 28.10.21

Most growing companies turn to IAM solutions for compliance purposes. What a waste. Today’s IAM capabilities go way beyond MFA & SSO: Implemented right, IAM can automate all employee-related IT processes, from account provisioning and deprovisioning to permission management. Join us and step into the world of: Automated workforce growth Increased employee & IT productivity […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure