IT Security Pros Admit They Can Use Old Credentials to Access Former Employer Systems

By Peter Bernstein May 28, 2014

Tonight is the night that NBC will air an exclusive interview done in Moscow recently by anchor Brian Williams with NSA leaker Edward Snowden. The reason to mention this is that it provides interesting context for the new “Information Security Survey 2014” from identity management solutions provider Lieberman Software on the subject of the use/abuse of credentials. Especially in the wake of all of the headlines about commercial security breaches on top of the NSA scandal, the survey results are a bit disturbing. The deadline that 13 percent of IT security pros say they can still access the systems of former employers using old credentials should be a major wake-up call.

Time to take stock and take action

The Lieberman survey was conducted at the recent RSA IT security conference. Through personal interviews conducted at the event it looked at the attitudes of more than 270 IT professionals, of who over 55 percent work in an organization with at least 1,000 employees, toward password management and cloud security.

If you found the headline number upsetting, a little more granularity from the interviews is not going to make you feel better.  Survey results included:

  • Of those who can still access their former employers’ systems, nearly 23 percent can get into their previous two employers’ systems using old credentials.
  • More than 16 percent admit to still having access to systems at all previous employers.

In response to these findings, Philip Lieberman, CEO and President of Lieberman Software, said “The results of this research shows that a fundamental lack of IT security awareness in enterprises, particularly in the arena of controlling privileged logins, is potentially paving the way for a further wave of data breaches. Organizations must implement a policy where privileged account passwords are automatically updated on a frequent basis, with unique and complex values. That way, when an employee does leave the company, he or she is not taking the password secrets that can gain access to highly sensitive systems.”

Other findings from the survey also contain some valuable nuggets as food for thought:

  • 84 percent of organizations have a policy to ensure contractors cannot access corporate systems after they leave the company; however, more than 16 percent of respondents admit that their organization either does not have such a policy, or they are not aware of one.
  • Almost 1 out of 4 respondents work in organizations that do not change their service and process account passwords within the 90 day time frame commonly cited as best practice by most regulatory compliance mandates.
  • An overwhelming 80 percent of respondents choose to keep their organization's most sensitive data on their own network, rather than the cloud.
  • Nearly 3 out of 4 of those surveyed say that the cloud applications their users download cause security headaches.

“Companies and government agencies should not take such a lax approach to password management, especially given the attention that the Edward Snowden NSA scandal has received,” Lieberman continued. “Basic security best practices include minimizing the insider threat and sophisticated criminal hackers by managing the powerful privileged passwords that grant access to systems containing sensitive data.”

At this point it should be common sense that changing passwords is essential. Having had to change my personal ones recently because of the Heartbleed Bug, shopping at Target and having a PayPal account, the fact that so many companies have not shored up defenses in terms of such as simple thing as making sure former employees can’t use their old credentials to cruise around and possibly cause mischief is in a word, “mystifying.”  It is hard to believe that it is roughly a year since Snowden first started his leaking activities, it is equally as hard to believe that the response needing greater safeguards as to who has access to corporate networks and systems seems to be so slow.   




Edited by Maurice Nagle
SHARE THIS ARTICLE
Related Articles

Comcast-TWC Demise Points to Online Video's Ascendency

By: Tara Seals    4/27/2015

Comcast may have called off its $45 billion megamerger with Time Warner Cable, but the legacy of what that means for the FCC's policy for online video…

Read More

How Solar Investments Will Change in 2016

By: Anna Johansson    4/27/2015

The solar industry has been of particular interest to consumers, businesses, and technology developers over the course of the past decade or so. Solar…

Read More

Nevada: Silver State to Tech Center

By: Doug Mohney    4/24/2015

Silver was the primary mineral mined in Nevada when it was admitted to the union in 1864, earning it the slogan of "The Silver State." Times changed, …

Read More

Comcast, Telecoms Need to Clean Up Their Own Houses

By: Doug Mohney    4/24/2015

Big telecom mergers just don't fly these days, but it took Comcast 14 months and at least $237 million spent in 2014 to figure it out it couldn't buy …

Read More

Creating a Smarter Network Infrastructure for the Connected World

By: TMCnet Special Guest    4/24/2015

The need to be connected to the 'smarter world' is ever increasing with the rise in the number of mobile devices. LTE is now a global reality for mill…

Read More