IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Strong ID and access management eludes UK business

Survey reveals concerns over potential security and identity management lapses.

New research into attitudes towards identity and access management has found very few are taking effective steps to address potential security lapses.

Insight Consulting

And more than 90 per cent do not have a fully automated solution capable of producing audit reports detailing network, application and data access, despite the fact that 51 per cent of businesses surveyed now have to deal with increasing partner, supplier and customer system access.

In addition, only 50 per cent of respondents were confident that network access rights of staff members who leave a company are removed or deactivated when they leave - the other half leave outdated user accesses active and open to malicious misuse as well.

Only 22 per cent of businesses have an enterprise single sign-on identity and access management systems in place, which Insight said delivers the fastest return on investment.

"The lack of single "sign-on" awareness together with reliance on passwords was just the first of a series of major concerns highlighted by the research," said Colin Robbins, Insight Consulting principal consultant.

Not all of the research was negative in what it reveals about UK businesses attitudes towards identity and access; one positive aspect was that business is beginning to recognise the threat, with 74 per cent of the respondents admitting that they were actively looking at new 'user-centric' identity management technology.

But Robbins said: "While it is clear that many medium and large enterprise are already investigating new identity and access management technology, what has also become clear from our research is that many businesses are simply not doing enough, or are even in many cases wholly unaware of the existing risks to their business and how to go about managing the resources available to them."

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Most Popular

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Open source giant Red Hat joins HPE GreenLake ecosystem
automation

Open source giant Red Hat joins HPE GreenLake ecosystem

28 Jun 2022
Carnival hit with $5 million fine over cyber security violations
cyber security

Carnival hit with $5 million fine over cyber security violations

27 Jun 2022