Commissioned by UC platform Zoho, the report relies on 3,322 verified responses from IT and safety leaders throughout 9 areas, six industries, and twelve roles.
The report’s overriding conclusion, articulated by writer Helen Yu, is:
“Repair foundations earlier than chasing superior capabilities.’”
Learn Extra
Why Are Assaults Rising Whereas Password Safety Nonetheless Appears to be like Undeployed?
The report says one in three companies suffered a confirmed cyberattack final 12 months. One other 7% weren’t positive if that they had been attacked in any respect. That uncertainty is a governance threat.
What stands out is what number of organizations nonetheless lack primary password safety controls. Solely 26% have deployed a devoted password supervisor, regardless that the risk image is painfully acquainted.
Within the report’s Risk Panorama rating, based mostly on the highest threats recognized by survey respondents, phishing and social engineering ranked first. This was adopted by weak or reused passwords, after which by credential stuffing assaults. In different phrases, the most important dangers are usually not unique hacks. They’re repeatable credential weaknesses that password safety tooling is designed to scale back.
Utility sprawl can be pouring gasoline on this. 59% of workers now use 15+ apps for work. Meaning extra credentials, extra resets, extra reuse, and extra possibilities for errors. You possibly can name that an id drawback, however it additionally turns into an id administration workload drawback in a short time. And with out higher password safety, MFA can really feel like a pace bump moderately than actual safety.
Why Is Id Administration Visibility The Quiet Failure Level?
Most organizations can’t absolutely reply a primary query: who has entry to what?
The report calls this the id visibility hole. It finds that 74% lack full id visibility. Solely 11.6% report full visibility and management. When orphaned accounts and undocumented entry are included, 88% nonetheless lack full visibility.
That is the place id administration stops being a software dialog and turns into an structure dialog. The report is blunt that the difficulty is integration. It says full credential governance requires 4 methods working collectively in actual time: HR and listing providers, SSO and id supplier for MFA, a password vault, and entry governance for certification and orphaned account detection.
When these methods don’t share information, gaps multiply. Workers go away and accounts stay. Function adjustments don’t set off opinions. Orphaned entry builds quietly. That’s how id administration turns into fragile even in well-funded groups.
Regional snapshots don’t soften the image. The report says U.S. organizations have a 34% confirmed assault price and 76% lack full id visibility. In the meantime, the UK and EU face accelerating governance strain, but 75% nonetheless lack full id visibility, making it a compliance legal responsibility.
Need extra weekly safety and compliance updates for IT leaders? Comply with UC Immediately on LinkedIn.
Why Do Zero Belief Safety And AI Plans Stall With out The Foundations?
Safety budgets are usually not the headline drawback right here. The report says 72% plan to extend safety spending over 5 years. But 80% say their stack shouldn’t be future-ready. That mismatch is a warning signal.
It additionally explains the Zero Belief safety hole. The report finds 65% nonetheless haven’t any Zero Belief safety technique. Amongst non-adopters, 48% cite lack of processes and instruments as the principle barrier. It additionally notes vendor sprawl, with 30% managing six or extra safety distributors. Fragmentation slows execution and breaks visibility.
Then there may be the AI optimism lure. The report says 90% imagine AI will strengthen safety, however solely 8% are able to deploy AI-powered safety now. That’s an 82-point hole. The primary blockers are legacy infrastructure (52%), value and migration complexity (48%), and lack of inside experience (38%).
Probably the most desired AI options are telling. Groups need anomaly detection (68%), automated coverage enforcement (61%), and behavioral analytics (54%). These all rely upon clear id alerts, secure credential governance, and dependable controls. In different phrases, they rely upon stronger password safety, stronger id administration, and a working Zero Belief safety mannequin.
Ultimate Takeaway
This report is principally saying, “the assault is already right here, so cease pretending the fundamentals can wait.”
If password safety remains to be underdeployed, credential assaults keep low cost and repeatable. If Id administration visibility is incomplete, you can not show management. If Zero Belief safety remains to be “subsequent 12 months,” the window of vulnerability stays open.
The neatest transfer shouldn’t be extra hype. It’s higher sequencing. Centralize password safety first. Deal with id administration as an integration requirement. Construct Zero Belief safety on prime of visibility and governance. Then add AI the place it could truly assist.
Prepared for the broader framework on safety, compliance, and threat in fashionable communications? Discover The Final Information to UC Safety, Compliance, and Threat.
FAQs
What’s password safety in workforce environments?
Password safety is the way you management credential creation, storage, sharing, and reuse. The report highlights password managers as a key baseline management.
Why is id administration tied to compliance threat?
Id administration turns into a compliance threat once you can’t show who has entry. The report exhibits most organizations lack full id visibility.
What’s Zero Belief safety, in plain English?
Zero Belief safety means no consumer or machine is trusted by default. Entry is verified repeatedly based mostly on id and context.
Does MFA exchange password safety?
No. MFA helps, however weak credentials nonetheless create publicity. Robust password safety makes MFA more practical and fewer fragile.
Why do Zero Belief safety packages stall even with greater budgets?
The report factors to structure and integration gaps. Fragmented Id administration and power sprawl sluggish Zero Belief safety execution.

