SHARE
Facebook X Pinterest WhatsApp

Adaptive Authentication May Be More Accepted by End Users than 2FA

8 Tips for Ensuring Employee Security Compliance End users do not like using two-factor authentication (2FA) options, and that feeling is getting worse as the need for multi-factor authentication increases. IT decision makers told SecureAuth that three-quarters of their end users complain about having to use 2FA, with 10 percent saying they “hate” it. I […]

Written By
SP
Sue Poremba
Jan 12, 2017
Slide Show

8 Tips for Ensuring Employee Security Compliance

End users do not like using two-factor authentication (2FA) options, and that feeling is getting worse as the need for multi-factor authentication increases.

IT decision makers told SecureAuth that three-quarters of their end users complain about having to use 2FA, with 10 percent saying they “hate” it. I get that frustration. While I have no problem with going through multiple steps to log in to certain applications, it can be inconvenient if I don’t have my cell phone handy for the authentication text or forget which security question/answer set goes with which website. Craig Lund, CEO and founder of SecureAuth, recognized that frustration, saying in a formal statement:

IT professionals face an ongoing battle as they are frequently forced to choose between user experience and increased security. This should be a false paradigm in 2017.

2FA isn’t the only thing that suffers from providing a smooth user experience over security. It’s a problem that also plagues the Internet of Things (IoT). Not only is security not baked into IoT devices, end users prefer to focus on the convenience and bypass the security. Think about it. Which is easier – using the default password that comes with a router or changing it? And if you do change it, how many of you focus on a new password that is really easy to remember rather something strong?

Yes, we like convenience over security, even when we know we should be smarter. According to an eSecurity Planet article, a study conducted by the University of Phoenix found that 52 percent of end users will overlook security if it means better accessibility, even when we know what those risks are. Should we expect 2FA to be any different?

A better authentication method, the folks at SecureAuth believe, is adaptive authentication, which the Identity Automation blog described this way:

It’s a method for selecting the right authentication factors depending on a user’s risk profile and tendencies – for adapting the type of authentication to the situation.

This makes a lot of sense to me, especially as behavioral analytics are being used more as a cybersecurity tool to customize the authentication for the situation. It appears that IT decision makers are interested in this method, as the SecureAuth study found that 37 percent of respondents are using adaptive authentication already, and another 16 percent plan to adopt it in the next year. As Lund stated:

Organizations are already implementing stronger methods of user authentication, including adaptive access control and multi-factor authentication. By layering adaptive techniques such as device recognition, geo-location, the use of threat services, and even behavioral biometrics, organizations can verify the true identity of the end user while still providing positive user experience.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.