• News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Friday, June 2, 2023
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home News Complex Logins Fuel Stress, Increase Risk and Harm Productivity
  • News

Complex Logins Fuel Stress, Increase Risk and Harm Productivity

By
ITsec Bureau
-
September 15, 2022
39
Complex
Complex-Logins-Fuel-Stress_-Increase-Risk-and-Harm-Productivity

1Password, the leader in human-centric security and privacy, today released its Unlocking the Login Challenge report. Based on a survey of 2,000 North American adults, the research explores how login fatigue compromises employee productivity, security and mental health, frustrating workers and putting essential data at risk.

Accessing work applications is a significant drain on employees, with widespread repercussions for companies. Forty-four percent of employees report that simply logging in and out of apps at work harms their mood or reduces productivity. Worryingly, more than two in five (43%) employees admit to dangerous online behaviors such as sharing logins, offloading tasks to others, or even abandoning certain tasks altogether to circumvent complicated login procedures.

“When it comes to security, organizations say, ‘Follow these guidelines,’ then they add more rules every time something goes wrong. But every new rule creates new friction for employees, which acts as a bar on full productivity,” said Dr. Karen Renaud, human-centric security expert and Chancellor’s Fellow and Faculty Member at University of Strathclyde. “This research confirms the serious toll that this friction is taking on employee well-being and, as a result, on organizations’ security. Security has become such an onerous and arduous task that people don’t even want to log in – that’s a significant problem.”

Login Agony

Cumbersome passwords and authentication requirements are much more than an annoyance. Four in ten employees (41%) say having to remember multiple logins heightens stress levels and strains mental health.

  • Falling behind on day one: More than a third of employees (37%) say that the onboarding process at their current job was time-consuming, confusing or challenging when it came to logging into work-related accounts.

  • Benefits breakdown: Complex logins have kept nearly one in five (19%) workers from accessing employee-provided benefits designed to reduce workplace stress. They’ve skipped open enrollment, forgone requesting time off, and missed employer-provided perks and discount marketplaces because of login challenges.

Productivity Pain

Complex login processes meant to enhance company performance are in many situations accomplishing the opposite, an ironic turn of events that’s putting companies at risk and harming productivity. When facing onerous security requirements, employees accustomed to easy-to-use technology are simply waving the white flag on core parts of their job.

Also Read: Top Five Benefits of Cloud Native Application Security

  • Incomplete work product: More than a quarter of employees (26%) have given up on conducting a work task to avoid the hassle of logging in.

  • Missing meetings: Nearly two-thirds of employees (62%) miss more than 10 hours of meetings per year due to login issues.

  • Skipping security: Nearly 2 in 5 employees (38%) have procrastinated, delegated or skipped setting up new work security apps because of burdensome login processes.

Cybersecurity Concern – and Confusion

Today’s employees have a healthy concern for cybersecurity risks, with 61% fearing they are more likely to be hacked now than they were a year ago due to their heightened online presence. Despite this elevated awareness, widespread confusion over best practices is putting companies at greater risk.

  • Blurring work and home boundaries: Nearly half of employees (45%) use their personal email, LinkedIn, Facebook or other personal account for single sign-on at work. This puts companies at risk because they are unable to monitor these accounts for security risks or ensure that best security practices are being followed.

  • Perplexed by passwords: More than a quarter of employees (27%) – and 41% of leaders at the level of vice president and above—think there’s no difference between single sign-on and reusing the same password across multiple platforms. In fact, the two are almost polar opposites – reusing passwords dramatically increases exposure to hackers, while single sign-on is specifically designed to boost security by reducing the number of entry points that need to be secured.

“Modern companies are grappling with the unintended consequences of complex login processes. Although they were designed to protect us, they are in many cases creating more stress, elevating risk and hurting the bottom line,” said Jeff Shiner, CEO of 1Password. “This report is a wakeup call that it’s time to invest in human-centric security that’s as easy to use as the workplace and personal apps we rely on every day.”

For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.

  • TAGS
  • 1Password
  • CEO
  • CTO
  • Login
  • marketplaces
  • North American
  • privacy
  • security
Previous articleConcentric AI Collaborates with Snowflake to Enhance Data Security Posture Management for Joint Customers
Next articleInspira Enterprise, Inc. Introduces iSMART2 “Vulnerability Management-in-the-Box”
ITsec Bureau
https://itsecuritywire.com/
The ITSecurityWire Bureau has well-trained writers and journalists, well versed in the B2B Information technology industry, and constantly in touch with industry leaders for the latest trends, opinions, and other inputs in cybersecurity to bring you the best and latest in the domain.

RELATED ARTICLESMORE FROM AUTHOR

Dynatrace Enhances Collaboration with Red Hat, Introduces New Integration Capabilities for Event-Driven Ansible

Dynatrace Enhances Collaboration with Red Hat, Introduces New Integration Capabilities for Event-Driven Ansible

Kdan Mobile Announces Collaboration with CyberLink, to Strengthen e-Signature Anti-fraud Capabilities with AI Technology

Kdan Mobile Announces Collaboration with CyberLink, to Strengthen e-Signature Anti-fraud Capabilities with AI Technology

Dig Security Secures Strategic Investment from Samsung Ventures for Cloud Data Security Posture Management (DSPM)

Dig Security Secures Strategic Investment from Samsung Ventures for Cloud Data Security Posture Management (DSPM)

Latest posts

CyberLink Announces the Integration of Its FaceMe® Security Facial Recognition Software with AXIS Camera Station-01

“CyberLink Adds an Important Update to Its FaceMe® Security Facial Recognition Software “

April 18, 2022
Use Cases and Top Techniques of Data Masking

Use Cases and Top Techniques of Data Masking

March 10, 2023
Hancom

Hancom Works Brings Self-Managed Data Privacy, Collaboration and Productivity to the Cloud

December 15, 2020
Rohde Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity Launches New Generation of High Speed ​​Network Encryption Appliances and Software...

December 1, 2020
Ransomware attack

Paying the ransom is still the most common response to a ransomware attack

September 27, 2022


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Barracuda Zero-Day vulnerability Exploited to Deliver Malware for Months Before Discovery
  • Moxa Patches MXsecurity Product Vulnerabilities That Can Be Exploited By Malicious Hackers
  • Why XDR Investment is Necessary for CISOs
  • Why AI is Imperative for Building a Robust Zero-Trust Strategy
  • Dynatrace Enhances Collaboration with Red Hat, Introduces New Integration Capabilities for Event-Driven Ansible

Visit Our Other Publication



Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Learning Center
  • Privacy Policy
  • Do Not Sell My Information
  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Learning Center
  • Privacy Policy
  • Do Not Sell My Information
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy