Sign in
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
  • Quick Bytes
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Thursday, January 21, 2021
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
  • Quick Bytes
Home Featured Articles CIOs weigh in on the Continuous Authentication indecision
  • Featured Articles

CIOs weigh in on the Continuous Authentication indecision

By
Megana Natarajan
-
December 8, 2020
5
Continuous Authentication indecision

Security leaders are conflicted over the use of continuous authentication protocol for the enterprise security

In the traditional methods, the most common authentication process is where users type in their credentials and passwords to login to a website or computer. They type in the password once; if it’s authenticated and allowed by the OS, then the particular session is unlocked.

In more secure practices, enterprises insist on secondary authentication element. It may be a one-time password, biometric sample, or physical equipment. The basic theme among all such authentication tools is that they must authenticate the users only once. Once the authentication is done, there are no checks or restrictions on gaining access to prevent unauthorized access.

CISOs say that when a user mistakenly leaves the computer unattended, the system is not equipped to know if the same employee who was authenticated initially is the one using it now. It could be an intruder who came across an unattended and unlocked system.

Security leaders want organizations to deploy strong security strategies that go beyond the initial authentication. This will ensure that data is not risked at the most commonly manipulated endpoint of network security.

Updated protocols like continuous authentication is a measure,  which constantly checks the authenticity of the user for the entire time that they are logged into the session. Continuous authentication focuses on the largest risk factor in the computer security segment- users leaving behind unattended and unlocked devices. This protocol prevents tailgating. It refers to an unauthorized person gaining access to a restricted device or area without valid authentication. Piggybacking is also prevented in this method. It refers to authenticated users deliberately allowing an unauthorized person access to their session or system.

Read More: Successfully deploying an Identity-Centric Security Approach 

Security leaders believe that the most effective continuous authentication protocol would involve various authentication measures to serve the best workflow for users and the top security level for administrators. This solution must be transparent to employees- and should be running continuously even without user input.

Advantages of continuous authentication compared to static authentication

Dynamic security over single logins

CISOs say that one-time authenticated sign-in is similar to checks at entrances. After that, no one is aware of their activities inside the campus. Static authentication solutions are not strong enough to constantly change practices like- shared accounts, personal laptops, multi-terminal access, etc. An effective authentication strategy will consider all human factors and environments as possible instead of relying on humans alone.

Reduced reliance on users

Security leaders say that serving robust security across the session and correctly identifying how to end sessions are the critical goals in the continuous authentication strategy. When user interaction is not required in continuous authentication, dependency on people is drastically reduced.

Read More: COVID-19 – Cyber Security Industry to Witness Growth

Reduced stress for admins

CISOs acknowledge that due to oversights in security measures by users, admins are under increased pressure during the pandemic. Often, employees will avoid all security-related measures and training like the plague and find ways to bypass the admin’s security, mostly to make processes easier for them. Using strong security solutions for continuous monitoring of users during the session’s complete duration is the best way to validate the highest number of security vectors possible.

Security leaders and C-suite leaders say that risk officers and administrators need to start considering beyond the traditional authentication methods. An effective continuous authentication strategy will expand the normal login process and decrease the threats in endpoint security by continuously securing all unattended points.

  • TAGS
  • CIOs
  • dynamic authentication
  • single login
  • stress
  • unauthorized user
Previous articleData Localization Suite launched by Cloudflare
Next articleThe Impact of IT and OT Convergence on Industrial IoT Security
Megana Natarajan
Megana Natarajan
Megana Natarajan is a Global News Correspondent with OnDOt Media. She has experience in content creation and has previously created content for agriculture, travel, fashion, energy and markets. She has 3.9 years’ experience as a SAP consultant and is an Engineering graduate.

RELATED ARTICLESMORE FROM AUTHOR

Do vulnerability management measures have a data problem

Do vulnerability management measures have a data problem?

Will industrial networks undergo far-ranging and long-lasting changes

Will industrial networks undergo far-ranging and long-lasting changes?

The Disconnect between IT and Employees Are Affecting Remote Productivity

The Disconnect between IT and Employees Are Affecting Remote Productivity

Latest posts

Port53 Technologies

Port53 Expands Its Cyber Services as Bill Parmelee, Former Vice President at Optiv, Joins the...

September 3, 2020
CRITICALSTART

New CRITICALSTART and AttackIQ Offering Helps Security Teams Find Potential Gaps and Prevent Hackers From...

October 7, 2020
Data443 Triples Data Center Storage

Data443 Triples Data Center Storage Capacity Due To Significant Increase In Customer Consumption

November 30, 2020
Crypto Agility

Why CISOs should Shift their Attention to Crypto Agility

September 22, 2020
DLT Solutions Bolsters Hybrid Cloud

DLT Solutions Bolsters Hybrid Cloud, AI, Security and Other Software Offerings for the U.S. Public...

November 20, 2020


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Microsoft Takes Additional Steps to Address Zerologon Flaw
  • Malwarebytes Says it was Hacked by SolarWinds Attackers
  • Vulnerabilities in Facebook, Signal, and Google Chat Apps Let Hackers Spy on Users
  • Atos completes the acquisition of Canada-based cybersecurity firm In Fidem
  • Accedian and UnderDefense Partner to Deliver Cyber Resiliency Suite

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy