Workers put off mobile business apps due to password complications and network security fears
Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords
October 22, 2014
PRESS RELEASE
Reston, VA – Leading digital identity expert Intercede today revealed the results of its latest research The Rise of the Identity Centric Economy, which found that workers US were put off logging into secure business apps due to the perceived weakness of their network security, and many were frustrated by long, complicated passwords.
The survey of 1,074 US employees across a range of industries revealed that almost a third (30%) thought their networks weren’t secure enough for business apps, while 13% were put off accessing secure apps due to the complex signing in process. A further 10% couldn’t log in as they were simply unable to remember their passwords.
Currently, 81% of workers surveyed used a company or personal mobile device to access secure corporate data with 15% leaving themselves signed in at all times. Just 5% of respondents were concerned that if they lost their handset corporate information would be compromised – highlighting the laissez faire approach to devices in general and the need for robust security measures on handsets.
However, security is clearly an issue with over half (51%) of the 2,000 US consumers polled overall in the survey, who stated that they considered the security features of a device before purchasing a handset.
Richard Parris, CEO of Intercede said: “Fears about long, complex passwords and insecure network connections are hampering the growth of BYOD and effective working through secure apps. CIOs are currently in a difficult position. There are great advantages to companies using secure apps accessed on employees’ personal devices, but an alternative to the complex signing-in processes currently in place must be found, while also allaying the security fears.
“The best approach is to turn mobile devices into secure authentication devices, which act as the first line of defense to protect corporate data being accessed on them. The report highlights the need for companies to act quickly and robustly to employ effective BYOD policies while protecting their own data, or risk major security incidents."