The Number One Cause of Data Breaches is Compromised User Identities

The Number One Cause of Data Breaches is Compromised User Identities

The Ponemon 2017 Report reveals a global trend that organizations increasingly are concerned they will not be able to manage emerging IT security risks, because many security solutions are too outdated to deal with threats from disruptive technologies, cybercrime, and compliance.

69 percent of the respondents in the survey say their organization’s existing security solutions are outdated and inadequate. Certain technologies are needed for a new IT security infrastructure and according to 78 percent of the respondents, one of the most important technologies is Identity and access management.

This is also supported by the Verizon’s 2016 Data Breach Investigations Report, that states the #1 cause of data breach is compromised user identities.


Protect digital identities

A modern security architecture is purpose-built, based on the company’s vision to protect digital identity for all users across hybrid cloud and mobile environments. It supports security industry standards and integrates with other technologies and it empowers your mobile workers, supports bring your own device (BYOD) initiatives and provide secure access to cloud, mobile and on-premises apps. Moreover, it ensures that your employees, contractors, partners and customers have secure access to the right resources, at the right time, for the right reason.

Finally, it meets the specific requirements of the industry and federal regulations with a unified identity platform that helps you control, audit and report on access to sensitive data while reducing complexity and keeping users productive.

The study offers you global trends in IT security risks and pinpoints why and how security practices and policies need to evolve in order to deal with threats from disruptive technologies, cybercrime and compliance. The report surveyed more than 4000 global IT and security practitioners.


Read the full article from Centrify about findings in the Ponemon 2017 report here ►

Prepare for the EU GDPR: 8 Steps to reduce your risk and get in control