top of page

Is Your Accessibility Policy Making You a Target? How to Stay Secure Without Locking People Out

Being accessible should not mean being vulnerable. Many organisations unintentionally weaken security when trying to be more inclusive. The challenge is ensuring accessibility without creating loopholes that attackers can exploit.

Security should support accessibility, not remove it. Here’s how to do both effectively.


Strengthen Authentication Without Compromising Accessibility

Too many companies relax security requirements for users who struggle with passwords or multi-factor authentication. Instead of reducing security, provide alternative options that maintain protection.


  • Use biometric authentication, such as fingerprint or facial recognition, to eliminate passwords

  • Offer physical security keys, such as USB or NFC keys, for users with motor impairments

  • Provide adaptive authentication, adjusting security based on risk level


Security should not be a barrier but a flexible solution that meets different user needs without introducing risks.


Prevent Support Desks from Becoming an Easy Target

Attackers exploit IT support by pretending to be users needing accessibility accommodations. This manipulation leads to security controls being bypassed.


  • Implement additional verification for accessibility-related requests, such as confirming via a backup method or requiring a pre-registered support request

  • Train IT teams to detect social engineering tactics, including fake frustration or urgency designed to pressure support staff

  • Never allow security downgrades over email or chat alone. Verify requests through secure communication methods, such as a call to a trusted contact


Accessibility should not be a vulnerability for attackers to exploit.


Improve CAPTCHA and Login Barriers Without Compromising Security

Many organisations remove CAPTCHAs to help users with accessibility needs, but this also opens the door to automated attacks. The goal is to keep security strong while ensuring accessibility.


  • Use alternative CAPTCHAs, such as logic-based challenges or secure audio options

  • Implement adaptive security measures that adjust based on the login attempt’s risk level. Low-risk logins require fewer steps, while high-risk logins trigger extra verification

  • Avoid email-only logins, as they are highly vulnerable to phishing and account takeovers


Test Security Measures with Users Who Need Them

Security features should be tested with real users who rely on accessibility tools to ensure they provide equal protection without unnecessary hurdles.


  • Work with users who rely on assistive technology to confirm that login processes are accessible

  • Evaluate alternative authentication options to ensure they maintain the same level of security as standard methods

  • Identify areas where poor user experience creates security gaps, rather than assuming accessibility is the problem


Final Thought: Is Your Business at Risk?

Security should not force people into insecure workarounds. Accessibility should not weaken security. Both must work together seamlessly. Businesses should assess their current policies by identifying where security might be unintentionally compromised for accessibility or vice versa.


If security measures exclude people, they are ineffective. If accessibility policies lower security, they are not truly inclusive. Organisations should conduct regular accessibility-security audits, involve real users in testing, and ensure alternative authentication methods are as strong as the default ones.


A well-designed system protects everyone without making security harder to navigate. One real-world example of accessibility and security working together is financial institutions implementing biometric authentication, allowing users with disabilities to access accounts securely without needing complex passwords. This approach ensures security while maintaining usability for all users.


bottom of page