itb-nz logo
Story image

'Immature' firms struggling to manage credential compromise

28 Feb 2019

It’s highly likely that a data breach will involve some kind of privileged credential abuse but it’s still one security issue that is being overlooked by many organizations.

That’s according to research from Centrify, which polled 1000 IT decision makers across the United States and United Kingdom. Those decision makers admitted that 74% of breaches involved compromised access to privileged credentials – yet most of them are still extremely immature in their privileged access management (PAM) journey.

That immaturity results in granting employees and other stakeholders too much access and too much privilege to potentially sensitive data and critical infrastructure.

According to the research, 65% of respondents somewhat often share root or privileged access to data and systems; 63% take more than one day to close privileged access to employees who have left their organization; 52% do not use a password vault; and 21% have not implemented multi-factor authentication for privileged administrative access.

Commenting on the findings, Centrify CEO Tim Steinkopf says that Forrester estimated 80% of breaches involve privileged credentials, but now Centrify’s evidence backs that estimate up.

“What’s alarming is that most organizations aren’t taking the most basic steps to reduce their risk of being breached. It’s not surprising that Forrester has found 66% of companies have been breached five or more times."

"It’s well past time to secure privileged access with a Zero Trust approach, and many organizations can significantly harden their security posture with low-hanging fruit like a password vault and multi-factor authentication.”

Despite many modern use cases for privileged credentials, they are still not managed properly.

The research found that 72% of respondents don’t secure containers with privileged access controls; 68% don’t secure network devices (hubs, switches, routers) with privileged access controls;

58% don’t secure big data projects with privileged access controls; and 45% don’t secure cloud workloads with privileged access controls.

“Today’s environment is much different than when all privileged access was constrained to systems and resources inside the network. Privileged access now not only covers infrastructure, databases and network devices, but is extended to cloud environments, Big Data, DevOps, containers and more,” says Steinkopf.

Centrify says IT practitioners should consider that security controls like privileged access management are fundamental enablers of digital transformation.

Gartner predicted Privileged Access Management to be the second-fastest growing segment for information security and risk management spending worldwide in 2019. Gartner also named privileged access management a top 10 security project for 2019.

Story image
Ivanti launches automated assistants to empower IT teams
Ivanti has added new Ivanti Assistants to its portfolio of enterprise service management (ESM) solutions to bring endpoint self-healing capabilities to businesses.More
Story image
How data warehouses have become the new data lakes for business
While data lakes are great when it comes to storage, they don’t perform well when it comes to analysis and reporting. The vast volumes and multiple formats mean that traditional data warehouse tools are unsuitable and another approach needs to be found.More
Link image
AvePoint Free Webinar: Maximise productivity using Microsoft Teams Template
As more workers turn to Microsoft Teams for remote productivity, learn how to leverage the Teams Template functionality when creating new Teams and how to provide unique provisioning, sharing and other settings for different departments.More
Story image
NetFoundry offers new Azure integration to extend edge computing and 5G
In a bid to advance Internet of Things (IoT) edge computing and private 5G, NetFoundry has extended its integration with Microsoft Azure Edge Zones.More
Story image
Start-up raises 1M, looks to save enterprises from technical debt
“We are on a mission to help enterprises deliver high-quality SaaS implementations at scale by shining a light on the costly and problematic issue of technical debt."More
Story image
Interview: RSA explains security in the epoch of IT disruption
We discussed cybersecurity in terms of how it fits into business continuity, as well as the threat landscape, and what RSA is currently doing to assist businesses that need protection.More