Welcome!

News Feed Item

Swivel Secure Research: Password Plague Puts US Businesses in Jeopardy

New research conducted by two factor authentication provider, Swivel Secure, today reveals a culture of carelessness amongst US business owners that is jeopardizing company security and inviting cyber crime.

The study*, which questioned 2,500 working Americans on their internet security habits, highlights how business-owners are taking insufficient steps to secure access to their workplace systems, setting a bad example to staff and dangerously exposing their company data as a result.

According to the research, nearly three-quarters (74.2%) of business owners keep a written log or have another offline system for recording their passwords. If more evidence of apathy at the top were needed, the study has also revealed that 63% of business owners continually re-use the same passwords to log in to different systems, yet 61% remain ‘unconcerned’ with the security of their corporate systems.

The study also suggests that this ambivalence has trickled down to influence the attitudes and behavior of employees. A staggering 73% of US full time workers admit to re-using the same batch of passwords online, with a third (33%) using less than five different passwords to access between 25 and 50 personal and business sites.

“A significant proportion of last year’s $46bn global spend on cyber security** will have been wasted as a direct consequence of password reuse,” comments Fraser Thomas, VP, International, Swivel Secure. “By continuing to rely on this outdated form of authentication, US business owners are undermining their investment in firewalls and other costly network security measures and leaving themselves dangerously exposed to cybercrime. Password reuse is rife. As a result, it may only take one employee’s Twitter or Amazon password to be hacked for unlawful and undetected access to their company systems to be gained.”

The study also suggests that diligence online appears to decrease with age. A huge 71% of 55-64 year olds are ‘unconcerned’ by the security of their work IT systems, compared with 47.1% of those aged between 25 and 34.

“For many, logging in with a username and password has become little more than a mechanical inconvenience,” continues Thomas. “Business owners must take responsibility for securing their systems at every level within their organizations. There are a wealth of flexible, easy to use and cost effective strong authentication platforms available which can be utilized to eradicate these risks.”

The Swivel authentication platform was first launched in 2003. It is now used by local government, the NHS, major global enterprises and smaller businesses in over 35 countries, to remotely access their business networks, virtual desktops and cloud-based applications. A strong alternative to usernames and passwords, the Swivel authentication platform offers the widest range of user deployment options according to Gartner, including mobile apps, SMS and interactive voice response channels.

* Independent survey of 2,500 US consumers conducted by The Leadership Factor in May 2014

** ABI Research

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it ...
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?