& cplSiteName &

Users Value Security Over Convenience – Finally

Mitch Wagner
2/23/2018
50%
50%

Security pros may be finally winning the fight to get users to value security over convenience.

Users' willingness to sacrifice security for convenience has been a long-time frustration for security professionals, but that seems to be changing. Users now rate security as more important than convenience, according to a recent IBM Corp. (NYSE: IBM) study: IBM Security: Future of Identity Study.

Security was particularly important for financial applications, while convenience was still a little bit more important for users of social media applications, according to the report.

Biometric and two-factor authentication are increasingly becoming more popular than traditional passwords, particularly among millennials. These younger ones were more likely to use those types of authentication technology, while older adults practiced better password hygiene, IBM says.

IBM surveyed nearly 4,000 adults worldwide. The study found that biometrics are becoming mainstream, with 67% of respondents comfortable using biometric authentication today. Further, 87% say they'll be comfortable with these technologies in the near future.

IBM Bangalore
IBM Bangalore


You're invited to attend Light Reading's Big Communications Event  – the one event that delivers fresh perspective on the rapid transformation of the telecom industry and the road ahead. We'll see you May 14-16 in Austin – communications service providers get in free!


Millennials, in particular, are comfortable with biometrics; 75% of respondents between the ages of 20 and 36 are comfortable with biometrics. And they're more likely to be careless about passwords: Fewer than half are using complex passwords, and 41% reuse passwords. Older users are more careful about passwords, but they are less likely to use biometrics and multifactor authentication, IBM says.

"Generational differences that emerged from the survey results showed that younger adults are putting less care into traditional password hygiene but are more likely to layer access with multifactor authentication, use biometrics for speed and convenience, and use password managers to secure their accounts," according to a report signed by Limor Kessem, IBM executive security advisor. "This could be an indication that younger generations have less confidence in passwords to begin with, thus looking to alternative methods to secure their accounts."

Companies that fail to secure data will pay a penalty with millennials, who are more likely to delete an account held by a breached service provider and move to a competing provider, IBM says.

Security beats convenience in all categories of apps, but particularly those where money is at stake: Banking, investing, budgeting, online marketplace and workplace, as well as email. The one exception in the IBM study was social media, where convenience still had a narrow edge over security and privacy. Users are still not awake to the vast and potentially dangerous amount of information about them held by social media platforms, IBM says.

How do users prioritize security, privacy and convenience for different types of applications? Source: IBM.
How do users prioritize security, privacy and convenience for different types of applications? Source: IBM.

IBM has advice for companies looking to do business with the new generation of more security-conscious users: adopt flexible identity platforms that let users choose between multiple authentication options. And businesses should also take risk-based approaches that balance security and convenience appropriate to the critical nature of the data being accessed.

The shift to security over convenience is a big change from a 2008 Gartner study, which found just the opposite. At that time, respondents said they used the same one or two passwords across online services, and they weren't interested in changing their methods to achieve greater security, Gartner said.

Security vs. convenience is a false choice, notes Cory Doctorow, blogger, technology activist and science fiction writer. It's "extremely inconvenient" to have "your identity stolen or your email published on the web or your baby monitor turned into a spycam," Doctorow writes. It's easier in the long run to exercise good security at the outset "than remediating the damage done from a security breach down the line."

User security is particularly important for cloud applications, which are frequently connected to one another and to on-premises applications, meaning that an attacker breaking into a single account on a single application can leverage that access to attack an entire enterprise. Also, while traditional applications require access to the enterprise's physical premises or WAN, pubic cloud applications are available all over the world, vastly increasing the attack surface. (See Cisco: Attackers 'Weaponize' Cloud Services.

Companies are lagging behind users in prioritizing security; businesses still prioritize expedience over security, at least in mobile, according to a recent Verizon study. (See Verizon Mobility Security Index Shows Enterprises Not Doing Enough.)

IBM published an infographic summing up its findings: The Future of Identity.

Related posts:

— Mitch Wagner Follow me on Twitter Visit my LinkedIn profile Visit my blog Follow me on Facebook Editor, Enterprise Cloud News

(18)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Educational Resources
sponsor supplied content
Educational Resources Archive
More Blogs from Wagner’s Ring
In a misguided attempt to protect content creators, the EU's Article 11 and Article 13 would have the opposite effect, preserving Facebook, Google and other hypercloud platforms' monopolies – forever.
IBM and Cisco are working with Europe's largest port to reduce fuel consumption and other costs and improve safety.
In which we receive an alarming email from Oracle.
SD-WAN is about more than saving money – it also provides application delivery, insights and reliability. Find out more in this podcast sponsored by Citrix.
Platform is designed to enable enterprises to build big data analytics apps that move easily between public and private clouds.
Featured Video
Flash Poll
From The Founder
After almost two decades at Light Reading, it's time for a different optical adventure.
Upcoming Live Events
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 6, 2018, London, United Kingdom
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
March 12-14, 2019, Denver, Colorado
All Upcoming Live Events
Hot Topics
MWCA Day 2 Recap: '5G' Rolls Out & We Roll On
Phil Harvey, US News Editor, 9/14/2018
Apple: It's the End of the SIM as We Know It
Iain Morris, International Editor, 9/13/2018
MWCA Day 1 Recap: 5G Is Here…?
Phil Harvey, US News Editor, 9/13/2018
So Long, & Good Luck With That
Steve Saunders, Founder, Light Reading, 9/14/2018
Animals with Phones
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Partner Perspectives - content from our sponsors
One Size Doesn't Fit All – Another Look at Automation for 5G
By Stawan Kadepurkar, Business Head & EVP, Hi-Tech, L&T Technology Services
Prepare Now for the 5G Monetization Opportunity
By Yathish Nagavalli, Chief Enterprise Architect, Huawei Software
Huawei Mobile Money: Improving Lives and Accelerating Economic Growth
By Ian Martin Ravenscroft, Vice President of BSS Solutions, Huawei
Dealer Agent Cloud – Empower Your Dealer & Agent to Excel
By Natalie Dorothy Scopelitis, Director of Digital Transformation, Huawei Software
All Partner Perspectives