Related topics
  • ,
  • ,
  • ,

Firms urged to tighten up access policies

Survey reveals worrying lack of security

triangular warning sign featuring exclamation mark

Half of us keep our passwords on Post-It notes and over a third of IT professionals say they could still access their company's network if they left their job.

These are just some of the worrying findings of a survey released on Tuesday by Cyber-Ark Software, which carried out the research at last month's Infosecurity Exhibition as part of the firm's annual investigation into trust, security and passwords.

"Companies need to wake up to the fact that if they don't introduce layers of security, tighten up who has access to vital information, and manage and control privileged passwords, then snooping, sabotage and hacking will continue to be rife," said Calum Macleod, European director for Cyber-Ark.

More than half of those surveyed said they still keep their passwords on a Post-It note; this is in spite of all the warnings to be more protective of passwords. This year's survey revealed that the 50 per cent number now applies to IT professionals as well.

Also, more than one-third of IT professionals admit they could still access their company's network once they'd left their current job, while over 25 per cent of respondents said they knew of another IT staff member who still had access to sensitive networks even though they'd left the company a long time ago.

These figures may be explained by the fact that 20 per cent of all organisations admitted that they rarely changed their administrative passwords. with a worrying 7 per cent saying they never change them. Eight per cent of IT professionals revealed that the manufacturer's default admin password on critical systems had never been changed, despite this being the most common way for virus writers to break into corporate networks.

"The easiest way to infiltrate a company's network is to look for administrative passwords which are left blank, still have the manufacturers default password or just use obvious names. Once you find these, which are unbelievably simple and common to find, you're into the system and have the highest level of authority - you've got control of the company's system."

Those are the words of Gary McKinnon, who has been named as the "most profligate military hacker of all time" and who is still waiting to be extradited to the US for gaining entry to 90 computers at the US Department of Defense.

Fifteen per cent of companies interviewed said they had experienced insider sabotage, an unsurprising statistic if you consider that over 33 per cent of IT staff said they use administrative passwords to snoop around corporate systems. This snooping has the potential to turn ugly if IT workers feel disgruntled or if they've been fired.

Copyright © 2007, ENN

Sponsored: How to determine if cloud backup is right for your servers