UK businesses are 'slow' to adopt multi-factor authentication
Businesses admit their password security isn't up to scratch, but vendor says "talk is cheap"


Password security within businesses is not evolving quickly enough, according to a new study, with nearly two-thirds of organisations admitting that they have still not implemented two-factor authentication.
An overwhelming number of UK companies are concerned that staff are re-using personal credentials for work accounts, raising the spectre of password re-use hacks, while 65% are uncomfortable with employees using their social media credentials to access corporate resources.
But 70% of 1,050 IT and business decision makers surveyed by Gemalto believe that consumer-grade authentication could be applied in the workplace, with over half of IT leaders saying that their own authentication methods suffer in comparison to those of Amazon and Facebook.
What is two-factor authentication? General Data Protection Regulation (GDPR) 68 million Dropbox credentials leak online Dropbox users may get free storage if they adopt stronger security
Gemalto's 2018 Authentication and Identity Management Index report found that adoption of two-factor authentication is increasing, with 76% of UK businesses expect to begin using a secondary identification check - such as a code sent to a mobile phone number - within two years, up from 66% in 2016. Just a third of staff are required to use it at the moment, according to Gemalto's report.
Joe Pindar, Gemalto's director of product strategy, said that many firms are simply failing to implement the necessary security tools to keep themselves safe from hackers.
"This is emphasised by the slow adoption of protection such as two-factor authentication - although adoption is increasing and the majority plan to introduce this within the next two years, talk is cheap and not enough is being done quickly enough," he claimed.
With GDPR just a few months away, organisations need to move faster to address any security risks in applications they use, he added, especially those with access to people's personal data.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"If they lack the expertise to do this, they must look to employ a third party to assist this process. Simply doing nothing is not an option for businesses any longer and actions speak louder than words," he said.
Picture: Bigstock
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Microsoft Authenticator mandates number matching to counter MFA fatigue attacks
News The added layer of complexity aims to keep social engineering at bay
By Connor Jones Published
-
As Google launches passwordless authentication for all, what are the business benefits of passkeys?
News Google follows Apple in its latest shift to passwordless authentication, but what are the benefits?
By Ross Kelly Published
-
There's only one way to avoid credential stuffing attacks
Opinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
By Davey Winder Published
-
Google Authenticator 2FA update accused of making service less secure
News Lack of end-to-end encryption in code backup has some developers worried
By Rory Bathgate Published
-
Five things to consider before choosing an MFA solution
In-depth Because we all should move on from using “password” as a password
By Rene Millman Published
-
What is multi-factor authentication (MFA) fatigue and how do you defend against attacks?
In-depth Strong authentication is key to security, but it needs to be properly managed to avoid MFA fatigue
By Sandra Vogel Published
-
Beyond Identity strikes up strategic partnership with World Wide Technology
News WWT will implement Beyond Identity’s authentication platform internally while also acting as a global channel partner
By Daniel Todd Published
-
Implementing strong authentication across your business
In-depth Strong authentication is hugely important, but implementing any regime at scale is not without its challenges
By Sandra Vogel Published