Feeds

Firms urged to tighten up access policies

Survey reveals worrying lack of security

Intelligent flash storage arrays

Half of us keep our passwords on Post-It notes and over a third of IT professionals say they could still access their company's network if they left their job.

These are just some of the worrying findings of a survey released on Tuesday by Cyber-Ark Software, which carried out the research at last month's Infosecurity Exhibition as part of the firm's annual investigation into trust, security and passwords.

"Companies need to wake up to the fact that if they don't introduce layers of security, tighten up who has access to vital information, and manage and control privileged passwords, then snooping, sabotage and hacking will continue to be rife," said Calum Macleod, European director for Cyber-Ark.

More than half of those surveyed said they still keep their passwords on a Post-It note; this is in spite of all the warnings to be more protective of passwords. This year's survey revealed that the 50 per cent number now applies to IT professionals as well.

Also, more than one-third of IT professionals admit they could still access their company's network once they'd left their current job, while over 25 per cent of respondents said they knew of another IT staff member who still had access to sensitive networks even though they'd left the company a long time ago.

These figures may be explained by the fact that 20 per cent of all organisations admitted that they rarely changed their administrative passwords. with a worrying 7 per cent saying they never change them. Eight per cent of IT professionals revealed that the manufacturer's default admin password on critical systems had never been changed, despite this being the most common way for virus writers to break into corporate networks.

"The easiest way to infiltrate a company's network is to look for administrative passwords which are left blank, still have the manufacturers default password or just use obvious names. Once you find these, which are unbelievably simple and common to find, you're into the system and have the highest level of authority - you've got control of the company's system."

Those are the words of Gary McKinnon, who has been named as the "most profligate military hacker of all time" and who is still waiting to be extradited to the US for gaining entry to 90 computers at the US Department of Defense.

Fifteen per cent of companies interviewed said they had experienced insider sabotage, an unsurprising statistic if you consider that over 33 per cent of IT staff said they use administrative passwords to snoop around corporate systems. This snooping has the potential to turn ugly if IT workers feel disgruntled or if they've been fired.

Copyright © 2007, ENN

Beginner's guide to SSL certificates

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.