Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free
Our blogs: Conversations around digital security
Search
Back to articles
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (658)
    • Manfred Kube (113)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Didier Benkoel-Adechy (32)
    • Maria Barbieri (30)
    • Kristel Teyras (24)
    • Xavier Larduinat (21)
    • Haider Iqbal (21)
    • Neville Pattinson (20)
    • Sebastien Violette (20)
    • Frederic Martinez (20)
    • Ken Abbott (19)
    • Sophie Bessin-Py (19)
    • John Ahlberg (19)
    • Brittany Jedrzejewski (18)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Sek Leong (12)
    • Jennifer Hindle (12)
    • Sharon Ginga (10)
    • Cecile Eurendjian (10)
    • Axel Hansmann (10)
    • Kim Depussé (8)
    • Paul Kobos (8)

    Latest blog posts by:

    • Arta SylejmaniArta Sylejmani
    • Sek LeongSek Leong
    • Maria BarbieriMaria Barbieri
    • GemaltoGemalto
    • Cecile EurendjianCecile Eurendjian
    • John AhlbergJohn Ahlberg
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Cybersecurity
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile marketing
    • Mobile
    • Mobile payment
    • Mobile payments
    • Mobile World Congress
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Back to articles

Posted on 16 July 2012 by Gemalto in Enterprise Security

Who has the X Factor?

Last updated: 21 March 2014

In the latest of our posts looking at results of our recent CIO Research project we’re focusing on multi-factor authentication.

38 percent of the CIOs we spoke to as part of our study said that recent, high-profile data breaches experienced by other organizations had prompted them to increase their own security budget. This in itself is encouraging, as it shows more people at the top table of IT are sitting up and taking notice of the threats facing their business.

However, despite increased budgets in a significant proportion of the companies surveyed, the ways in which security was being implemented still left a lot to be desired. Most disturbing, almost half of the CIOs questioned (47 percent) believed a simple log-in and password was a secure enough form of authentication to protect their network and applications.

This attitude towards security may go some way towards explaining the inordinate number of high-profile security breaches which have occurred over the past year or two. While security experts have known for some time that multi-factor authentication is the most effective means of controlling access to sensitive data and systems, this message has clearly not been heard (or perhaps simply not heeded) by those in control of the IT function.

Cost was cited as the main barrier to implementing stronger authentication, with 56 percent of CIOs giving this as the reason why they had not put a more robust system in place. While ongoing economic uncertainty will no doubt be a factor in this lack of investment, we know that almost four in every ten CIOs was able to increase their investment in security this year. This implies authentication is being treated too casually compared to other elements of the security process. So, who does have the X-Factor?

As ever, whether you agree or disagree with our findings we’d love to hear from you. Either post a comment below or send me a message by clicking my name at the top of the page. And if you’d like to take a look at the full whitepaper report, you can download it free here.

Related posts:

French CIOs’ ability to economize will serve them well

Posted on 23 January 2013 by Gemalto in Corporate

In the final installment of our series of examining CIOs’ attitudes towards security, we turn our attention to France. Perhaps the most striking aspect of France’s attitudes towards IT security…

Data Lockup: The FBI Moves to Advanced Authentication for Law…

Posted on 03 July 2012 by Gemalto in Corporate

Terrorists. Organized crime and drug cartel kingpins. Fraudsters. Serial killers. Sex offenders. Name a criminal and there is one place you can find them all—the US Federal Bureau of Investigation’s…

4G on fast track to success in the USA

Posted on 24 March 2011 by Gemalto in Corporate

Both Verizon and AT&T have committed to have nationwide 4G LTE coverage in the U.S. by 2013. This week at CTIA we’re seeing new handsets that are 4G capable and…

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2023 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy