Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

07:00 AM
Dark Reading
Dark Reading
Products and Releases

Workers put off mobile business apps due to password complications and network security fears

Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords

Reston, VA – Leading digital identity expert Intercede today revealed the results of its latest research The Rise of the Identity Centric Economy, which found that workers US were put off logging into secure business apps due to the perceived weakness of their network security, and many were frustrated by long, complicated passwords. 

The survey of 1,074 US employees across a range of industries revealed that almost a third (30%) thought their networks weren’t secure enough for business apps, while 13% were put off accessing secure apps due to the complex signing in process. A further 10% couldn’t log in as they were simply unable to remember their passwords.

Currently, 81% of workers surveyed used a company or personal mobile device to access secure corporate data with 15% leaving themselves signed in at all times. Just 5% of respondents were concerned that if they lost their handset corporate information would be compromised – highlighting the laissez faire approach to devices in general and the need for robust security measures on handsets.

However, security is clearly an issue with over half (51%) of the 2,000 US consumers polled overall in the survey, who stated that they considered the security features of a device before purchasing a handset. 

Richard Parris, CEO of Intercede said: “Fears about long, complex passwords and insecure network connections are hampering the growth of BYOD and effective working through secure apps. CIOs are currently in a difficult position. There are great advantages to companies using secure apps accessed on employees’ personal devices, but an alternative to the complex signing-in processes currently in place must be found, while also allaying the security fears.

“The best approach is to turn mobile devices into secure authentication devices, which act as the first line of defense to protect corporate data being accessed on them. The report highlights the need for companies to act quickly and robustly to employ effective BYOD policies while protecting their own data, or risk major security incidents."


For more information, please visit www.intercede.com, or follow us at @IntercedeMyID

About Intercede

Intercede is a software company specializing in identity and credential management with a global team of experts located in the US and UK. 

Intercede’s MyID software enables organizations to create and use trusted digital identities for employees, citizens and machines. This allows secure access to services, facilities, information and networks. 

MyID meets the highest government standards yet is simple enough to be deployed onto consumer devices such as smartphones and tablets. Critically, MyID provides an easy, convenient and secure alternative to passwords.

Millions of identities are managed using MyID and Intercede has provided identity verification and management services to global customers for more than 20 years. MyID is a commercial-off-the-shelf software product, designed and developed to be configurable so it can be embedded as the cornerstone of cyber security infrastructure for governments and corporations.

Customers trusting Intercede for secure digital identity include the US and UK governments and some of the world’s largest corporations, telecommunications providers and information technology partners. 


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
Capital One Breach: What Security Teams Can Do Now
Dr. Richard Gold, Head of Security Engineering at Digital Shadows,  8/23/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.