Case Studies

Password gamble

by Mark Rowe

IT security people are gambling with the security of their organisations by failing to update important service and process account passwords on a regular basis, it is claimed. Almost 15 percent are admitting to either never updating passwords or only updating them annually, a new survey from Lieberman Software Corporation has found.

The survey, which was carried out at an IT security event, studied the attitudes of 280 IT security people and also suggested that nine percent of organisations update their service and process account passwords on a six monthly basis, 53 percent update them on a quarterly basis, 21 percent update them on a monthly basis and only 1.5 percent update them on a daily basis.

Calum MacLeod, VP of EMEA at Lieberman Software Corporation, said: “As more and more security breaches are being uncovered, organisations should be taking a much more stringent approach at securing passwords. The defence and government industries, which are a very high target for cybercriminals, have come to realise that in order to improve security passwords need to be changed on an hourly basis. If passwords only get updated on a monthly or quarterly basis, think about the damage a cybercriminal can do in that time. Between one to three months of unlimited access into an organisation’s critical systems – they could literally walk away with everything.”

Half of the respondents of the survey that admitted to never updating service and process account passwords said that the reason for this was out of fear that changing passwords could potentially cause outages and downtime.

MacLeod said: “The organisations that choose not to update service and process account passwords because they are worried about causing outages, and believe the consequences of a cyber attack would be less severe than downtime, obviously do not understand how damaging a cyber attack can be and this points out a very worrying lack of awareness. The other respondents who admitted to never updating passwords, but didn’t cite network downtime as the reason, are playing with fire. Any organisation that doesn’t update their service account passwords, or only updates them on an annual basis, quite frankly doesn’t understand the importance of these systems.”

And Philip Lieberman, President of Lieberman Software Corporation, said: “This piece of research highlights that IT security professional are taking a very lax approach to securing important service accounts, which could cost organisations dearly over the coming months. We have consistently said that basic security includes locking down access to systems containing sensitive data to minimize the insider threat. However, only months after a string of publicised hacks, IT security professionals are failing to implement password management appropriately and could be actively paving the way for bigger security disasters. These passwords are shared among contractors and a number of other IT security professionals. If they are not changed on a regular basis they could very easily fall into the wrong hands. Didn’t the security industry learn anything from the Snowden scandal?”

Related News

  • Case Studies

    Festival radio comms

    by Mark Rowe

    Stewards and security staff need communications, available and reliable, at events. Two-way radio manufacturer Hytera authorised partner Roadphone NRB (National Radio Bank)…

  • Case Studies

    Aggressive dog owners

    by msecadm4921

    Younger people who are disagreeable are more likely to prefer aggressive dogs. That’s according to a study at the University of Leicester’s…

  • Case Studies

    House grease

    by Mark Rowe

    In Norton, Cleveland Police officers have started to use a grease on properties which illuminates under ultraviolet (UV) light. The aim, to…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing