Yubico research finds concerning trends around authentication security practices

A new global survey from Yubico has found that 59% of employees still rely on usernames and passwords as the primary method to authenticate their accounts.


Yubico's inaugural State of Global Enterprise Authentication Survey 2022, conducted for Yubico by Censuswide, polled 16,000+ employees across a variety of enterprises in eight countries. The research comes in line with Cybersecurity Awareness Month.


The survey asked employees about their perceptions and perceived challenges in relation to MFA, security tools and internal security practices at their organisation, as well as asking about their recent experiences with cyberattacks.


Cybersecurity authentication and MFA trends were found to be the top areas mentioned, with the most alarming statistic revealing that 59% of employees still rely on usernames and passwords as their primary method to authenticate into accounts.


Nearly 54% of employees also admitted to writing down or sharing a password, and over 22% of those surveyed still believed that usernames and passwords are the most secure authentication method.


61% of employees thought their organisation needed to upgrade to modern phishing-resistant MFA and 79% of VP-level staff want their organisation to upgrade to modern phishing-resistant MFA (like hardware security keys).


The research also found that there was a lack of training and knowledge relating to cybersecurity protocol.


More than 54% of employees said they are not required to go through cybersecurity training on a frequent basis.


Employees are also engaging in potentially unsafe device habits. Over the last 12 months, nearly 57% admitted to using a work-issued device for personal use. 


"Cybersecurity Awareness Month brings global awareness for security hygiene, and is a good time for people and organisations to take action now to shore up their cybersecurity practices," says Stina Ehrensvrd, CEO and Co-Founder, Yubico.


"The results f ..

Support the originator by clicking the read the rest link below.