Mobile Authentication: The Good, The Bad & The Ugly

Cybercriminals are continuously looking for innovative new attack methods and, currently, 31 percent of UK businesses face a cyber attack at least once a week. It is therefore essential that business leaders keep up to date with the latest cyber threat trends and ensure they are considering how adversaries could be gaining access to sensitive data due to ineffective authentication methods and poor cyber hygiene practices.

When it comes to gaining access to devices and workspaces, many companies have moved past relying on simple username and password combinations and have turned to mobile-based authentication as an extra layer of protection. However, while mobile devices may be convenient to use and can offer users a sense of security, this form of authentication isn’t as secure as it may seem.

Mobile Authentication Is Not As Convenient Nor Secure As Many Believe

Mobile devices have many uses and benefits; however, they can also be easily lost, stolen, or broken. This opens organisations up to numerous cybersecurity risks and makes them much less convenient to use for signing into important accounts.

Secondly, mobile devices offer limited use as authentication methods in locations with reduced mobile coverage or security restrictions. In these cases, users who need to authenticate via mobile devices are left unable to retrieve their private information. Low battery power can also interfere with mobile authentication, especially in situations when users cannot wait for their device to sufficiently charge.

Contrary to popular opinion, even in the right conditions, mobile devices are not the most secure form of digital authentication. As revealed in Yubico's State of Global Enterprise Authentication Survey, UK respondents believed passwords (23 percent), push authenticator apps or mobile one-time passcodes (OTPs) (23 percent), and mobile SMS-based authentication (20 percent) to be the most secure forms of digital authentication. However, these conventional methods have proven to be susceptible to a variety of common cyber attacks.

Although some form of cyber security is always better than having none whatsoever, passwords and mobile-based authentication – such as digital authentication apps, OTPs, and SMS verification – are not effective enough to mitigate increasingly advanced attacks.

Man-in-the-middle (MitM) attacks, phishing, SIM swapping, password spraying, and ransomware can all bypass traditional authentication methods and lead to data breaches, imposing devastating consequences on targeted organisations, their employees, and customers.

The Benefits Of Alternative Authentication Methods

For UK businesses looking for alternative methods, it is important to be aware that some forms of multi-factor authentication (MFA) and two-factor authentication (2FA) are more robust than others. For example, stronger methods require users to authenticate with either a hardware security key or identity credential that is unique to the individual user such as a fingerprint. With the help of FIDO protocols - globally recognised standards of public key cryptography techniques delivering stronger authentication - methods like these provide users with a seamless and more secure experience when accessing their digital accounts by removing the need for passwords or mobile devices.

These methods also offer robust authentication across multiple devices and accounts, reducing the number of times a user needs to sign in. However, most importantly, implementing business-wide passwordless solutions helps to bolster an organisation’s security posture and significantly reduces the risk of emerging attacks.

Better Cyber Hygiene & Business-Wide Training

Even the most robust digital authentication solutions must be paired with good cyber hygiene practices, reinforced with regular cyber training. According to our survey, just 42 percent of UK participants claim they are required to attend frequent cybersecurity training – suggesting that most organisations aren’t adequately enforcing up-to-date business-wide cyber training.

Findings also show that over the previous 12 months, UK respondents confessed to not reporting a phishing attempt (31 percent), allowing their work-issued device to be used by someone else (33 percent), using a work-issued device for personal use (49 percent), using a personal device for work (58 percent), and having an account reset due to lost or forgotten credentials (58 percent).

The combination of weak authentication methods and poor digital habits like these make organisations especially vulnerable to cyber attacks which can directly target their customers, employees, and third-party partners too.

It’s important to enforce better cyber hygiene practices on a regular basis to protect organisations fully and effectively from emerging threats.

Moving Away From Mobiles & Towards Passwordless Authentication

Mobile-based authentication, OTPs, and passwords are some of the most widely used authentication methods but are not the most secure. It is up to organisations to upgrade their digital security by implementing phishing-resistant passwordless solutions which are more effective and user-friendly than conventional authentication methods.

Employees can be the biggest strength or weak link in an organisation’s cybersecurity, so providing robust authentication and best-practice training should be a top priority. In doing so, UK-based organisations can reap the long-term benefits of improved data security and ensure their business continuity.

Mark Bell is Channel Manager at Yubico

You Might Also Read:

Cyber Security Issues For The Mobile Industry:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Five Biggest Dangers Of AI For The Upcoming Years
Penetration Testing Is A Vital Tool To Deal With AI-Based Attacks  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Messageware

Messageware

Messageware is the market leader in securing, enhancing, and customizing Microsoft Exchange and Outlook Web App.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

International Cybersecurity Forum (FIC)

International Cybersecurity Forum (FIC)

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).