CISO study: passwords are unsuitable

Survey CISO passwords

Share post

Ivanti study among CISOs: Passwords are increasingly unsuitable for protecting corporate data. Remote working has accelerated the erosion of the traditional network perimeter, creating new IT security challenges for CISOs.

The Corona-related “Everywhere Enterprise” has shifted the priorities of the CISOs: reducing mobile security risks has replaced combating network security threats as a top priority. This is the result of a current survey by Ivanti among those responsible for information security in companies. Nearly nine in ten (87%) of the Chief Information Security Officers (CISO) surveyed agreed that mobile devices have become the focus of their cybersecurity strategies. Four in five (80%) CISOs said passwords are no longer an effective way to protect corporate data as hackers increasingly target external employees and mobile devices.

Study with 400 CISOs from the EMEA region

The study, which polled 400 CISOs in the EMEA region, found that 82 percent of respondents believe remote working is accelerating the decline of the traditional network perimeter. For CISOs, the most important thing is that only trustworthy users, devices, networks and apps can access company data:

  • Access to company resources over unsecured Wi-Fi in the home offices of employees is one of the biggest vulnerabilities for IT security during the pandemic for one in two (45%) of the respondents.
  • Using your own devices is an additional challenge for 40 percent of CISOs.
  • Unauthorized apps pose a significant risk for a third (33%) of those surveyed.

Home office requires additional security

Study ivanti cisos Almost all CISOs (93%) are convinced that they have coped well with the unexpected move to the home office with their solutions. At the same time, just as many (92%) assume that they need additional IT security measures in order to counter the new mobile threat landscape. Looking ahead, nearly two-thirds (64%) of CISOs plan to invest in mobile threat detection software. And more than half (58%) said improving usability, improving authentication (passwords) on remote applications (57%), and moving critical business applications to the cloud (52%) are top priorities this year will have.

“The pandemic is acting as a catalyst for CISOs to ensure that working from anywhere, on any device, is just as secure as working in the office on a company-owned laptop,” said Peter Machat, vice president Central EMEA at Ivanti. “The 'everywhere enterprise' – where IT infrastructures are distributed and employees need anywhere access to company data – has dramatically changed the role of the CISO and put mobile security at the forefront. CISOs must now place a greater focus on establishing, securing and optimizing mobile work environments.”
Ivanti recommends implementing a zero trust security strategy to ensure that only trusted users can access corporate data.

Identify endpoints across the enterprise

Automation technologies also have the potential to identify, manage, secure, and maintain all endpoints, devices, and data across the enterprise. It should always be assumed that corporate networks have already been compromised. Automation technologies offer the potential to proactively detect threats and secure devices. Systems with suitable authentication - without passwords - further reduce the attack surface.

Directly to the report at ivanti.com

 


About Ivanti

The strength of unified IT. Ivanti connects IT with security operations in the company in order to better control and secure the digital workplace. We identify IT assets on PCs, mobile devices, virtualized infrastructures or in the data center - regardless of whether they are hidden on-premise or in the cloud. Ivanti improves the provision of IT services and reduces risks in the company on the basis of specialist knowledge and automated processes. By using modern technologies in the warehouse and across the entire supply chain, Ivanti helps companies improve their ability to deliver - without changing the backend systems.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more