IT Security

Multiple barriers to IT adoption

by Mark Rowe

About half, 52 per cent of European IT decision makers believe it’s their sole responsibility to overcome the multiple barriers that exist to adopting new IT security within their organisations, according to research by an identity security product company, Ping Identity. Nearly 60 per cent of IT decision makers across Europe cited budget as one of the biggest barriers to adopting new technologies, with 23 per cent stating compliance issues and 28 per cent revealing that time was a significant barrier to implementation.

New identity security software, including two-factor authentication and biometric solutions, topped the list of technology that European IT decision makers were keen to implement, with 84 per cent of respondents considering it a top priority for the business as a whole.

Comment

Phil Allen, VP EMEA at Ping Identity said: “IT decision makers are stuck between a rock and a hard place, knowing they need to overcome these barriers to ensure their business remains safe, but being faced with an uphill climb that potentially leaves the organisation exposed in the meantime. Undertaking a digital transformation project and implementing new security technologies throughout a business can be a daunting proposition – especially if perceived barriers are firmly in place. However, there are some simple, yet effective, steps that IT decision makers can follow in order to ‘break down’ any barriers to strong identity security:

1) Arm the CEO and C-suite with information as to why identity security should be a board-level concern. Cyber-attacks and password breaches cannot just cause reputational damages, but can also result in the loss of highly confidential corporate data and cause tangible financial losses. Speaking to the board in these terms will ensure that robust identity security is considered as crucial to the growth of the business.

2) Provide knowledge that is easily digestible for various stakeholders within the business. Senior business decision makers will need to understand the business case for new identity security technologies. Providing them with something as simple as examples of companies that have implemented new technologies seamlessly and cost-effectively can significantly help to change mindsets.

3) Integrate new software with existing legacy systems. Replacing legacy IT infrastructure can be costly and timely. However, legacy systems can be brought up to date with the integration of cloud-based technologies.

4) Ask your staff what identity technologies they want to see rolled out across the business. People are arguably a business’ most valuable asset, so it is imperative to regularly ask the organisation what more they need in the way of new software and new technology. For example, many employees may want more secure and seamless access to their work devices and programmes, so that they can work on the move and in the most productive manner possible. In this regard, investing in two-factor authentication could be a solution to ensuring staff are happy, productive and secured.”

Research methodology

Research by Censuswide; 601 IT decision makers were surveyed in UK, France and Germany (300 in the UK, 151 in France, 150 in Germany) in November 2015.

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing