Infographic:Security Breaches from Compromised User Logins

We recently did some research on security breaches with IT Security Managers in the US and UK and discovered the following results.

Compromised credentials are key to avoiding network breach detection. But for a security administrator, it can be a daunting task trying to identify suspicious activity when the adversary has valid and authorized credentials. Whilst it is often end user security behavior that allows these credentials to be stolen, rather than blaming users for being human, this infographic shows you how to better protect all user’s authenticated logins.

Infographic: Security Breaches from Compromised User Logins UserLock FileAudit IS Decisions Priorités en matière de sécurité d'accès

Feel Free to Share
our Security Breach Infographic.

Use the embed code provided below. Just drop it in to your site.

<a href="" title="Infographic: Security Breaches from Compromised User Logins" target="_blank"><img usemap="#infographic" src="" alt="Infographic: Security Breaches from Compromised User Logins" /></a><map name="infographic"><area shape="rect" alt="UserLock" title="" coords="169,5271,379,5319" href="" target="" /><area shape="rect" alt="FileAudit" title="" coords="610,5269,816,5318" href="" target="" /><area shape="rect" alt="IS Decisions" title="" coords="23,5869,251,5915" href="" target="" /><area shape="rect" alt="Priorités en matière de sécurité d'accès" title="" coords="29,5976,420,5992" href="" target="" /></map>

About the Study: Some details
All statistics are from IS Decisions’ research into access security priorities of 500 IT Security Managers in the US and UK.

Most of us use login credentials to access our emails and computers both at home and at work. Sometimes these logins can be very complex, so when systems require users to re-authenticate credentials at regular intervals it can become quite frustrating for the user. On the other hand, if we just relied on simple login procedures it would make things easier for the user, but the network itself would be less secure.

Essentially, IT departments must strike the right balance between adding extra security measures without frustrating the end user and impeding productivity.

Enforcing user security often can result in complex, costly and disruptive processes. As we have seen from the research, multi-factor authentication solutions are not widely adopted and most likely because they impede end-users with additional security steps that prove costly, complex and time consuming for the IT department to set up and manage.

However, there is another option for IT managers to consider – simplistic contextual solutions that can be personalized easily to each employee, ultimately striking the balance between user productivity and user security.