Commissioned by UC platform Zoho, the report relies on 3,322 verified responses from IT and safety leaders throughout 9 areas, six industries, and twelve roles.
The report’s overriding conclusion, articulated by creator Helen Yu, is:
“Repair foundations earlier than chasing superior capabilities.’”
Learn Extra
Why Are Assaults Rising Whereas Password Safety Nonetheless Appears to be like Undeployed?
The report says one in three companies suffered a confirmed cyberattack final 12 months. One other 7% weren’t certain if that they had been attacked in any respect. That uncertainty is a governance threat.
What stands out is what number of organizations nonetheless lack primary password safety controls. Solely 26% have deployed a devoted password supervisor, despite the fact that the risk image is painfully acquainted.
Within the report’s Risk Panorama rating, primarily based on the highest threats recognized by survey respondents, phishing and social engineering ranked first. This was adopted by weak or reused passwords, after which by credential stuffing assaults. In different phrases, the most important dangers usually are not unique hacks. They’re repeatable credential weaknesses that password safety tooling is designed to scale back.
Utility sprawl can be pouring gas on this. 59% of workers now use 15+ apps for work. Which means extra credentials, extra resets, extra reuse, and extra probabilities for errors. You possibly can name that an id downside, nevertheless it additionally turns into an id administration workload downside in a short time. And with out higher password safety, MFA can really feel like a velocity bump fairly than actual safety.
Why Is Identification Administration Visibility The Quiet Failure Level?
Most organizations can’t absolutely reply a primary query: who has entry to what?
The report calls this the id visibility hole. It finds that 74% lack full id visibility. Solely 11.6% report full visibility and management. When orphaned accounts and undocumented entry are included, 88% nonetheless lack full visibility.
That is the place id administration stops being a device dialog and turns into an structure dialog. The report is blunt that the problem is integration. It says full credential governance requires 4 techniques working collectively in actual time: HR and listing companies, SSO and id supplier for MFA, a password vault, and entry governance for certification and orphaned account detection.
When these techniques don’t share knowledge, gaps multiply. Staff go away and accounts stay. Position adjustments don’t set off critiques. Orphaned entry builds quietly. That’s how id administration turns into fragile even in well-funded groups.
Regional snapshots don’t soften the image. The report says U.S. organizations have a 34% confirmed assault fee and 76% lack full id visibility. In the meantime, the UK and EU face accelerating governance strain, but 75% nonetheless lack full id visibility, making it a compliance legal responsibility.
Need extra weekly safety and compliance updates for IT leaders? Comply with UC At present on LinkedIn.
Why Do Zero Belief Safety And AI Plans Stall With out The Foundations?
Safety budgets usually are not the headline downside right here. The report says 72% plan to extend safety spending over 5 years. But 80% say their stack isn’t future-ready. That mismatch is a warning signal.
It additionally explains the Zero Belief safety hole. The report finds 65% nonetheless don’t have any Zero Belief safety technique. Amongst non-adopters, 48% cite lack of processes and instruments as the primary barrier. It additionally notes vendor sprawl, with 30% managing six or extra safety distributors. Fragmentation slows execution and breaks visibility.
Then there may be the AI optimism lure. The report says 90% imagine AI will strengthen safety, however solely 8% are able to deploy AI-powered safety now. That’s an 82-point hole. The principle blockers are legacy infrastructure (52%), price and migration complexity (48%), and lack of inner experience (38%).
Probably the most desired AI options are telling. Groups need anomaly detection (68%), automated coverage enforcement (61%), and behavioral analytics (54%). These all rely on clear id alerts, steady credential governance, and dependable controls. In different phrases, they rely on stronger password safety, stronger id administration, and a working Zero Belief safety mannequin.
Last Takeaway
This report is mainly saying, “the assault is already right here, so cease pretending the fundamentals can wait.”
If password safety continues to be underdeployed, credential assaults keep low-cost and repeatable. If Identification administration visibility is incomplete, you can not show management. If Zero Belief safety continues to be “subsequent 12 months,” the window of vulnerability stays open.
The neatest transfer isn’t extra hype. It’s higher sequencing. Centralize password safety first. Deal with id administration as an integration requirement. Construct Zero Belief safety on prime of visibility and governance. Then add AI the place it could possibly truly assist.
Prepared for the broader framework on safety, compliance, and threat in fashionable communications? Discover The Final Information to UC Safety, Compliance, and Threat.
FAQs
What’s password safety in workforce environments?
Password safety is the way you management credential creation, storage, sharing, and reuse. The report highlights password managers as a key baseline management.
Why is id administration tied to compliance threat?
Identification administration turns into a compliance threat whenever you can’t show who has entry. The report reveals most organizations lack full id visibility.
What’s Zero Belief safety, in plain English?
Zero Belief safety means no person or gadget is trusted by default. Entry is verified constantly primarily based on id and context.
Does MFA substitute password safety?
No. MFA helps, however weak credentials nonetheless create publicity. Robust password safety makes MFA simpler and fewer fragile.
Why do Zero Belief safety packages stall even with greater budgets?
The report factors to structure and integration gaps. Fragmented Identification administration and power sprawl gradual Zero Belief safety execution.





