Security can be a vicious cycle. A breach occurs. Enterprises add a new level of security. That increases inconvenience for users, who find workarounds. Then there's another breach and the cycle begins again.
“Every time we have a breach, we add another three feet of security fencing, and expect the users to just climb three feet higher,” says Andre Boysen, chief identity officer at Ontario-based SecureKey Technologies.
One of the coping mechanisms that users adopt is to share passwords across multiple sites – once any of those sites are compromised, all of those accounts could potentially be compromised, including those that are work related.
To continue reading this article register now