An alternative to complex, costly and disruptive multi-factor authentication.


Research into the access security priorities of 500 IT Security Managers in the US and UK, showed multi-factor authentication (MFA) solutions are not widely adopted and most likely because they impede end-users with additional security steps that prove costly, complex and time-consuming for the IT department to set up and manage.

Respondents have said that its complexity that’s the biggest barrier to guarding against compromised credentials, and it’s complexity that’s negatively affecting productivity.

However there is another option for IT managers to consider – a simplistic contextual solution that can be personalized easily to each employee, ultimately striking the balance between user productivity and user security.

Drawing on the research findings and our own expertise, learn how to achieve the best of both worlds - a secure network and productive workforce.

The challenge

The danger of compromised credentials from poor logon security

There are plenty of examples of how much damage one incident of unwanted access can do to a company’s reputation and /or financial bottom line.

Despite this our research reveals that many organizations are still failing to protect against compromised network logins.

of organizations suffered a security breach as a result of compromised credentials

of organizations believe detecting possible compromised credentials is important

Compromised credentials are key to avoiding network breach detection. You’re not likely to detect someone from ‘inside’ or ‘outside’ the organization using stolen or shared credentials because your system believes that person on the network is who they say they are. The logon belongs to an authenticated user with authorized access!

The common causes of compromised logins

It’s first and foremost end user security behavior that endangers your network.

Phishing (user clicks on link and enters credentials)


Password sharing with colleagues


Key-logging malware


Social engineering (unknowing handing over to malicious party, other than phishing)


Duplication (i.e. reuse of corporate credentials on third-party sites for ease)


Hacked database including user credentials


Users are human, they are flawed, and they are careless and often exploited. They will always act outside the boundaries of policy and sometimes common sense.

Security solutions must be there to protect employees from careless behavior but also protect the business from outsiders trying to gain access to the network by pretending to be employees.

A move away from MFA security controls that impede your employees

Most organizations use at least one additional method than passwords to verify all users claimed identity to guard against compromised credentials.

Multi-factor authentication (MFA) is a method that combines two or more independent credentials known to the user and is designed to protect the network in the event that one or the other credentials have been compromised.

MFA has been covered a lot in the media over the last few years so it might be surprising for IT managers to learn from our research that MFA figures were lower than expected.

What method does your company currently use to guard against compromised network credentials?

Multi-factor authentication

MFA solutions are not widely adopted and most likely because they impede end-users with additional security steps that prove costly, complex and time-consuming for the IT department to set up and manage.

Our research shows that organizations are becoming more aware of the effect that complex security has on productivity, with 51% saying the day-to-day impact of security on employee productivity is increasing.

« The day-to-day impact of security on employee productivity is increasing »
Agree or strongly agree

Today’s digital workforce require fast access to information be competitive and effective and thus demand less friction, reducing the value of preventative access controls that impede users such as tokens.

Security procedures are there to aid and protect the organization as a whole, not hinder the productivity of its employees.

Avoid adding complex and costly solutions that only end up being disruptive to IT managers

When it comes to wanting to guard against the threat of compromised credentials, our research highlighted the biggest barriers IT managers face.

The top three are: complexity with existing IT infrastructure, time to manage and oversee and the cost of technology solutions.

Complexity with IT infrastructure
Time to manage and oversee
Cost of technology solutions

Security does not have to be frustrating. Focus on solutions that are adaptive to your existing IT infrastructure and easy to deploy across all users without the need for additional hardware or software such as tokens or individual installations across workstations.

Select a solution that leverages on your existing investment and IT infrastructure that can be seamlessly installed without the need to go to each work station to deploy it and without the need for complex or customized code. Most importantly, select one that is easy to manage.

The solution

Securing your network with contextual security

Striking the right balance between user productivity and user security is an understandable challenge but with the right technologies and processes in place, the two aren’t mutually exclusive.

Most organizations do use at least one additional method to guard against compromised network credentials and are prioritizing methods like real-time monitoring of accounts, alerts for abnormal logon activity and contextual access restrictions.

What method(s) does your company currently use to guard against compromised network credentials?

User login passwords


Alerts on abnormal logon activity


Information security awareness and training


Privilege access and account management


Real-time monitoring of account logon activity


Multi-factor authentication


User behaviour analytics


Contextual access restrictions to limit end users’ access


Single sign on


Your users will have already been assigned logins, but you won’t know if abnormal behavior is happening if you don’t monitor these sessions. Real-time monitoring of user activity lets you know who is connected from which workstation or device and since when. It is the simple answer to creating a more secure environment that does not have a negative impact on users.

It is important to identify the warning signs when someone uninvited has breached your network. In our survey we’ve identified the top five most common signs that IT managers look out for:

The top five signs above are top for a reason — because they are the usual suspects when it comes to identifying if someone uninvited has breached your network.

By taking a closer look at the contextual information around the logon, you can identify and stop network access when credentials have been compromised. For example, are they logging in outside of normal office hours? Are they logging in from a location they have never logged in from before? Are they accessing files en mass? These behaviors should ring alarm bells that something’s not right.

IT departments can easily set and enforce a customized access policy that includes context-aware restrictions such as location, IP address, time of day, and number of simultaneous sessions that are transparent to the user and does not impede on productivity. These access policies protect against compromised network credentials to reduce the risk of both external attacks and internal security breaches.

Here are some important signs so you can investigate quickly when something goes wrong
59
Unusual resource usage

(for example, mass file or access)


58
Implausible remote access

(access from unlikely locations)


48
Password resets

48
Sudden change in working/office hours

46
Impossible journeys

(sequential logins from locations too far apart to travel between in the time)

Using contextual security doesn’t just help guard against compromised credentials, it operates transparently without impeding users with any additional security actions or restrictions.

Compromised credentials can happen to everyone - Don't let it be you

Drawing on the research findings and our own expertise we have produced a simple five-step guide to those organizations that want the best of both worlds — a secure network and a productive workforce.

  • Step 1
    Implement real-time monitoring

    so you know what’s happening on your network.

  • Step 2
    Look at contextual information

    so you can identify if authenticated credentials have been compromised and stop network access.

  • Step 3
    Customise network access controls

    on when, where and how long users access the networks. If an employee signs in from an unusual location from an unusual time — you’ll know something is not right.

  • Step 4
    Choose a solution that is neither complex nor costly

    and also does not impede productivity so you can strike the right balance between protection and detection, and user security and user productivity.

  • Step 5
    Train, educate and regularly remind employees on security,

    alongside sensible restrictions that will protect them and the network. Make them feel empowered and unimpeded, safe in the knowledge that if mistakes are made, the security solution will protect the network.

How to achieve these 5 steps

Our security software UserLock can help you achieve these 5 steps and guard against compromised credentials on a Windows network.

Working alongside Active Directory, UserLock works as a real alternative to MFA - neither impeding end-users or frustrating IT managers.

UserLock

User Logon Security for Windows Active Directory

Learn more