Business logins: Almost 60 percent use names and passwords

Business logins: Almost 60 percent use names and passwords

Share post

A global Yubico survey shows that 59% of employees still rely on name and passwords as the primary method of authenticating their accounts. The study shows some frightening results in terms of authentication in companies in 2022.

In light of recent phishing attacks, Yubico, the leading provider of hardware security keys, has presented the results of its first 2022 State of Global Enterprise Authentication Survey. Conducted by Censuswide on behalf of Yubico, the survey surveyed more than 16.000 employees at a variety of organizations in eight countries, including Germany, about their perceptions and perceived challenges of multi-factor authentication (MFA), security tools, and internal security processes in their companies and their recent experiences with cyber attacks.

Employees: More than 50 percent write down the passwords

The survey found many interesting results, but the following insightful trends in cybersecurity authentication and MFA stood out the most:

  • 59% of employees still rely on name and passwords as their primary method of authenticating their accounts
  • Almost 54% of employees admit to writing down or sharing a password.
  • More than 22% of respondents still believe that names and passwords are the most secure method of authentication.
  • 61% of employees believe their organization needs to upgrade to modern, phishing-resistant MFA and 79% of VP-level employees want their organization to upgrade to modern, phishing-resistant MFA (like hardware security keys).
  • More than 54% of employees do not require regular cybersecurity training.
  • In the last 12 months, nearly 57% admitted to using a company-provided device for personal use.
  • Within the last 2 years, nearly 40% of respondents have admitted their mobile phone has broken and nearly 30% have lost it (a device companies often use for authentication).

MFA is just a start

“The results of Yubico's global survey highlight the top concerns, challenges, and real-world scenarios facing organizations around the world when it comes to their cybersecurity efforts — including the existing reliance on outdated MFA solutions like one-time passwords. It's a stark reminder of how far companies still are from adopting and standardizing on phishing-resistant MFA tools."

More at Yubico.com

 


About Yubico

Yubico sets new global standards for easy and secure access to computers, mobile devices, servers and Internet accounts. The company's flagship product, the YubiKey, provides effective hardware-based protection for any number of IT systems and online services at the touch of a button. The YubiHSM, Yubico's highly portable hardware security module, protects confidential data on servers.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more