About the Study: Some details
All statistics are from IS Decisions’ research into access security priorities of 500 IT Security Managers in the US and UK.
Most of us use login credentials to access our emails and computers both at home and at work. Sometimes these logins can be very complex, so when systems require users to re-authenticate credentials at regular intervals it can become quite frustrating for the user. On the other hand, if we just relied on simple login procedures it would make things easier for the user, but the network itself would be less secure.
Essentially, IT departments must strike the right balance between adding extra security measures without frustrating the end user and impeding productivity.
Enforcing user security often can result in complex, costly and disruptive processes. As we have seen from the research, multi-factor authentication solutions are not widely adopted and most likely because they impede end-users with additional security steps that prove costly, complex and time consuming for the IT department to set up and manage.
However, there is another option for IT managers to consider – simplistic contextual solutions that can be personalized easily to each employee, ultimately striking the balance between user productivity and user security.