IT Security Pros Admit They Can Use Old Credentials to Access Former Employer Systems

May 28, 2014
By: Peter Bernstein

Tonight is the night that NBC will air an exclusive interview done in Moscow recently by anchor Brian Williams (News - Alert) with NSA leaker Edward Snowden. The reason to mention this is that it provides interesting context for the new “Information Security Survey 2014” from identity management solutions provider Lieberman Software on the subject of the use/abuse of credentials. Especially in the wake of all of the headlines about commercial security breaches on top of the NSA scandal, the survey results are a bit disturbing. The deadline that 13 percent of IT security pros say they can still access the systems of former employers using old credentials should be a major wake-up call.

Time to take stock and take action

The Lieberman survey was conducted at the recent RSA (News - Alert) IT security conference. Through personal interviews conducted at the event it looked at the attitudes of more than 270 IT professionals, of who over 55 percent work in an organization with at least 1,000 employees, toward password management and cloud security.

If you found the headline number upsetting, a little more granularity from the interviews is not going to make you feel better.  Survey results included:

In response to these findings, Philip Lieberman, CEO and President of Lieberman Software, said “The results of this research shows that a fundamental lack of IT security awareness in enterprises, particularly in the arena of controlling privileged logins, is potentially paving the way for a further wave of data breaches. Organizations must implement a policy where privileged account passwords are automatically updated on a frequent basis, with unique and complex values. That way, when an employee does leave the company, he or she is not taking the password secrets that can gain access to highly sensitive systems.”

Other findings from the survey also contain some valuable nuggets as food for thought:

“Companies and government agencies should not take such a lax approach to password management, especially given the attention that the Edward Snowden NSA scandal has received,” Lieberman continued. “Basic security best practices include minimizing the insider threat and sophisticated criminal hackers by managing the powerful privileged passwords that grant access to systems containing sensitive data.”

At this point it should be common sense that changing passwords is essential. Having had to change my personal ones recently because of the Heartbleed Bug, shopping at Target and having a PayPal (News - Alert) account, the fact that so many companies have not shored up defenses in terms of such as simple thing as making sure former employees can’t use their old credentials to cruise around and possibly cause mischief is in a word, “mystifying.”  It is hard to believe that it is roughly a year since Snowden first started his leaking activities, it is equally as hard to believe that the response needing greater safeguards as to who has access to corporate networks and systems seems to be so slow.   




Edited by Maurice Nagle


Original Page