Survey: IT leaders expect resistance to passwordless security

Nowadays, facial recognition can open your iPhone and the right fingerprint will log you into your work laptop.

As our everyday devices gain non-password authenticators, however, a study from Ping Identity and Yubico finds IT leaders predict resistance to the biometric option in their organizations: While 84% of global IT leaders consider passwords “a deceptively weak way to store your data,” 97% of respondents currently without passwordless authentication predict barriers in implementing the technology, citing a lack of urgency, technical expertise, and buy-in.

“Many of these roadblocks are not technological, but cultural,” reads the report. While 93% of the 600 IT leaders surveyed said that their organization is “at least somewhat likely” to adopt passwordless authentication,88% of those without passwordless authentication believe their organization would be resistant to adopting it.

To overcome the “cultural” barriers, organizations must emphasize two ideas, according to industry pros who spoke with IT Brew: communication and ease of use.

What’s the holdup?

While passwordless options like biometrics, pins, and hardware security keys take the guessable character-string option away from the hacker, the old authenticator is difficult for companies to quit—a reality that irks Zain Malik, senior product marketing manager at Ping Identity.

It’s kind of frustrating because there are less limitations than ever before, less barriers to entry. Our devices are now enabled with biometrics,” Malik told IT Brew. “So, it’s just a general human resistance to change.”

Take it easy

Passwordless implementation may have complicated hurdles: A thumbprint reader could be a fine option for an office worker, but not for factory-floor workers who are wearing gloves, said Malik. Legacy systems may not be ready to handle tokens.

To get buy-in from resistant humans, Terry Jost, managing director and global security and privacy segment leader at Protiviti, emphasizes the importance of keeping the authentication path simple.

“I think that the more you can make it easy for people to access their tools and their applications, then I think most people will go along with it,” said Jost.

Some organizations, to ease access, have their employees get their authentication out of the way early. Malik, for example, uses his thumbprint to log-in to his “dock” in the morning; as long as his device shows no anomalous behavior, no password is required for any other apps or programs beyond that point.

Authentication talks

A final driver for successful passwordless implementations, said Malik, is “executive sponsorship.”

A 2021 study, conducted by the Ponemon Institute and Secret Double Octopus, found that passwordless authentication saves the average organization approximately $1.9M in costs over conventional password-based authentication over two years, comparing the monetary costs of password attacks and help-desk requests.

“Nothing sells better than numbers that talk about cost savings and cost-efficiency,” said Ponemon Institute founder Larry Ponemon shortly after the paper’s release.

Hot this week

The Myth of Perfect Security

Perfect security is a myth, and focusing on resilience rather than prevention can better protect your organization from inevitable breaches.

Why Traditional Passwords Are Failing Us

Password fatigue from complex rules often causes more security breaches than weak passwords, requiring a shift toward user-friendly tools and behaviors.

Why Your Employees Are Your Best Security Defense

Empowering employees with security awareness training often provides better protection than stacking more technology, turning human factors from a weakness into your strongest defense.

Why Most Security Awareness Training Fails and What to Do About It

Security awareness training often fails because it focuses on knowledge rather than behavior, but shifting to a behavior-based approach can lead to better outcomes and fewer incidents.

The Myth of Multifactor Authentication Security

Multifactor authentication enhances security but is not foolproof, as it can be bypassed through social engineering and technical exploits. Understanding its limitations and adopting stronger methods is essential for effective protection.

Topics

The Myth of Perfect Security

Perfect security is a myth, and focusing on resilience rather than prevention can better protect your organization from inevitable breaches.

Why Traditional Passwords Are Failing Us

Password fatigue from complex rules often causes more security breaches than weak passwords, requiring a shift toward user-friendly tools and behaviors.

Why Your Employees Are Your Best Security Defense

Empowering employees with security awareness training often provides better protection than stacking more technology, turning human factors from a weakness into your strongest defense.

Why Most Security Awareness Training Fails and What to Do About It

Security awareness training often fails because it focuses on knowledge rather than behavior, but shifting to a behavior-based approach can lead to better outcomes and fewer incidents.

The Myth of Multifactor Authentication Security

Multifactor authentication enhances security but is not foolproof, as it can be bypassed through social engineering and technical exploits. Understanding its limitations and adopting stronger methods is essential for effective protection.

Why MFA Is Not Enough Anymore

Multi-factor authentication is no longer a silver bullet for security as attackers develop new bypass methods, requiring a layered defense approach with phishing-resistant tools and continuous monitoring.

Why Phishing Still Works and What to Do About It

Phishing remains a top threat because it exploits human psychology, not just technical gaps. Shifting focus to employee awareness and habits can build stronger defenses than relying solely on technology.

Rethinking Password Security

Complex password rules often increase risk by encouraging poor habits. Learn how password managers and multi-factor authentication offer more practical protection for organizations of all sizes.
spot_img

Related Articles

Popular Categories