{"id":18579,"date":"2018-08-09T14:16:44","date_gmt":"2018-08-09T18:16:44","guid":{"rendered":"https:\/\/www.jumpcloud.com\/?page_id=18579"},"modified":"2023-01-11T13:24:32","modified_gmt":"2023-01-11T18:24:32","slug":"why-its-time-to-take-identity-security-seriously","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/why-its-time-to-take-identity-security-seriously","title":{"rendered":"Why It\u2019s Time to Take Identity Security Seriously"},"content":{"rendered":"
Phishing, stolen identities, and weak passwords were the leading causes of data breaches in 20181<\/sup><\/a>, placing users and their credentials at the forefront of your network defenses. This reality hasn\u2019t caught up with most organizations, though. According to Gartner, companies were predicted to spend $96.3 billion on security in 2018. Yet, only $4.7 billion was supposed to go towards identity and access management, while the rest was supposed to go towards infrastructure protection, network security equipment, security services, and consumer security software2<\/sup><\/a>.\u00a0Spending more on segments like security services and infrastructure protection may have been adequate a decade ago, but today\u2019s prevalent cloud-forward IT environments call for an approach that takes identity security<\/a> more seriously. Those who have experienced a data breach would agree, with 68% of executives acknowledging that a larger investment in identity and access protection could have helped in preventing a breach3<\/sup><\/a>.<\/p>\n 191 accounts used by the average user<\/p>\n<\/li>\n 10% of those accounts are controlled by IT**<\/p>\n<\/li>\n 61% of users leverage same or similar passwords across all online resources*<\/p>\n<\/li>\n 123456 & password are the top 2 most popular passwords of 2018***<\/p>\n<\/li>\n 446 million records were exposed in 2018 alone.\u2020<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n With the amount of records exposed in 2018, that\u2019s enough to have affected the entire U.S. population and then some. This means that a majority of your employees have compromised credentials.\u00a0 To make matters worse, over half of your employees are using the same passwords across accounts, and those are supposed to guard access to your company\u2019s data. So, it\u2019s only a matter of time before a hacker finds one of your employee\u2019s reused passwords from the 1.4 billion available on the dark web7<\/sup><\/a>\u00a0and uses it to try to gain access to your digital assets. If you do have identity security in place, more than likely you are utilizing an antiquated solution that is putting you in a weak position to defend your digital kingdom. If you don\u2019t have any identity management solutions in place, you are open to a world of risk and expense.<\/p>\n So, why are 60% of execs who haven\u2019t experienced a breach still expecting to allocate most of their security budget to creating a strong perimeter even though the number one attack vector is identities3<\/sup><\/a>? Why are legacy identity management solutions no longer sufficient? The answer to both of these questions requires a deep dive into why it\u2019s time to take identity security seriously.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\nAfter all, consider this:<\/h4>\n
\n
First, What Exactly is Identity Security?<\/h2>\n\n\n