Survey: IT leaders expect resistance to passwordless security

Nowadays, facial recognition can open your iPhone and the right fingerprint will log you into your work laptop.

As our everyday devices gain non-password authenticators, however, a study from Ping Identity and Yubico finds IT leaders predict resistance to the biometric option in their organizations: While 84% of global IT leaders consider passwords “a deceptively weak way to store your data,” 97% of respondents currently without passwordless authentication predict barriers in implementing the technology, citing a lack of urgency, technical expertise, and buy-in.

“Many of these roadblocks are not technological, but cultural,” reads the report. While 93% of the 600 IT leaders surveyed said that their organization is “at least somewhat likely” to adopt passwordless authentication,88% of those without passwordless authentication believe their organization would be resistant to adopting it.

To overcome the “cultural” barriers, organizations must emphasize two ideas, according to industry pros who spoke with IT Brew: communication and ease of use.

What’s the holdup?

While passwordless options like biometrics, pins, and hardware security keys take the guessable character-string option away from the hacker, the old authenticator is difficult for companies to quit—a reality that irks Zain Malik, senior product marketing manager at Ping Identity.

It’s kind of frustrating because there are less limitations than ever before, less barriers to entry. Our devices are now enabled with biometrics,” Malik told IT Brew. “So, it’s just a general human resistance to change.”

Take it easy

Passwordless implementation may have complicated hurdles: A thumbprint reader could be a fine option for an office worker, but not for factory-floor workers who are wearing gloves, said Malik. Legacy systems may not be ready to handle tokens.

To get buy-in from resistant humans, Terry Jost, managing director and global security and privacy segment leader at Protiviti, emphasizes the importance of keeping the authentication path simple.

“I think that the more you can make it easy for people to access their tools and their applications, then I think most people will go along with it,” said Jost.

Some organizations, to ease access, have their employees get their authentication out of the way early. Malik, for example, uses his thumbprint to log-in to his “dock” in the morning; as long as his device shows no anomalous behavior, no password is required for any other apps or programs beyond that point.

Authentication talks

A final driver for successful passwordless implementations, said Malik, is “executive sponsorship.”

A 2021 study, conducted by the Ponemon Institute and Secret Double Octopus, found that passwordless authentication saves the average organization approximately $1.9M in costs over conventional password-based authentication over two years, comparing the monetary costs of password attacks and help-desk requests.

“Nothing sells better than numbers that talk about cost savings and cost-efficiency,” said Ponemon Institute founder Larry Ponemon shortly after the paper’s release.

Hot this week

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.

The Overlooked Vulnerability in Modern Cybersecurity

Security breaches often stem from communication failures rather than technical flaws. Building shared understanding between teams creates stronger protection than any firewall alone.

Why Passwords Alone Fail Us

Passwords alone cannot protect our digital lives anymore. Discover why password managers and two-factor authentication are non-negotiable tools for true security.

The Quiet Strength of Cyber Resilience

Building cyber resilience involves layered strategies like multi factor authentication, reliable backups, and incident planning - practical steps any organization can implement immediately.

Topics

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.

Why Perfect Security Is a Dangerous Illusion

Financial security teams waste resources chasing breach prevention when resilience and rapid recovery deliver better protection. Learn practical steps to shift focus from impossible perfection to manageable containment.

The Overlooked Vulnerability in Modern Cybersecurity

Security breaches often stem from communication failures rather than technical flaws. Building shared understanding between teams creates stronger protection than any firewall alone.

Why Passwords Alone Fail Us

Passwords alone cannot protect our digital lives anymore. Discover why password managers and two-factor authentication are non-negotiable tools for true security.

The Quiet Strength of Cyber Resilience

Building cyber resilience involves layered strategies like multi factor authentication, reliable backups, and incident planning - practical steps any organization can implement immediately.

Practical Cybersecurity Habits for Everyday Protection

Essential cybersecurity habits everyone can implement today including password managers multi-factor authentication and phishing awareness with global resource examples.

Mental Wellness in Cybersecurity A Necessary Focus

Cybersecurity professionals face unique mental health challenges requiring organizational support and personal resilience strategies for sustainable career longevity.

Building Stronger Defenses Through People

Human behavior remains cybersecurity's greatest vulnerability and strongest asset, with practical steps to foster collective vigilance.
spot_img

Related Articles

Popular Categories