Feeds

Firms urged to tighten up access policies

Survey reveals worrying lack of security

Build a business case: developing custom apps

Half of us keep our passwords on Post-It notes and over a third of IT professionals say they could still access their company's network if they left their job.

These are just some of the worrying findings of a survey released on Tuesday by Cyber-Ark Software, which carried out the research at last month's Infosecurity Exhibition as part of the firm's annual investigation into trust, security and passwords.

"Companies need to wake up to the fact that if they don't introduce layers of security, tighten up who has access to vital information, and manage and control privileged passwords, then snooping, sabotage and hacking will continue to be rife," said Calum Macleod, European director for Cyber-Ark.

More than half of those surveyed said they still keep their passwords on a Post-It note; this is in spite of all the warnings to be more protective of passwords. This year's survey revealed that the 50 per cent number now applies to IT professionals as well.

Also, more than one-third of IT professionals admit they could still access their company's network once they'd left their current job, while over 25 per cent of respondents said they knew of another IT staff member who still had access to sensitive networks even though they'd left the company a long time ago.

These figures may be explained by the fact that 20 per cent of all organisations admitted that they rarely changed their administrative passwords. with a worrying 7 per cent saying they never change them. Eight per cent of IT professionals revealed that the manufacturer's default admin password on critical systems had never been changed, despite this being the most common way for virus writers to break into corporate networks.

"The easiest way to infiltrate a company's network is to look for administrative passwords which are left blank, still have the manufacturers default password or just use obvious names. Once you find these, which are unbelievably simple and common to find, you're into the system and have the highest level of authority - you've got control of the company's system."

Those are the words of Gary McKinnon, who has been named as the "most profligate military hacker of all time" and who is still waiting to be extradited to the US for gaining entry to 90 computers at the US Department of Defense.

Fifteen per cent of companies interviewed said they had experienced insider sabotage, an unsurprising statistic if you consider that over 33 per cent of IT staff said they use administrative passwords to snoop around corporate systems. This snooping has the potential to turn ugly if IT workers feel disgruntled or if they've been fired.

Copyright © 2007, ENN

5 things you didn’t know about cloud backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Broadband slow and expensive? Blame Telstra says CloudFlare
Won't peer, will gouge for Internet transit
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?