Companies around the world are growing increasingly concerned that compromised employee credentials are resulting in damaging data breaches. A recent Cloud Security Alliance report has affirmed these suspicions. Digital security professionals across an array of industries were surveyed to determine the most common sources of data breaches. Compromised credentials turned out to be the top cause of business data theft. Those who responded to the survey also reported that compromised credentials will likely be the leading cause of data breaches across posterity.
Data Breaches Are Becoming More Common
Just under 20 percent of survey respondents report that their business experienced a data breach incident in the past. Of those afflicted, almost one-quarter of them report that the data breach resulted from compromised employee credentials. Survey responses turned even more negative when the questions turned toward what might be in store for the future. A whopping 65 percent of survey respondents stated that they believe there is a good chance their employer would suffer a future data breach as a result of stolen credentials.
Security Challenges and Possible Solutions
Survey respondents indicate that the most commonly used perimeter security tactic is antivirus software. All in all, 90 percent of respondents’ organizations used this anti-theft measure. Antivirus software was followed by e-mail spam filters and web application firewalls. Both of these security measures were used by over 80 percent of survey respondents’ employers. In terms of access controls for end users, a whopping 72 percent of survey respondents relied upon multi-factor authentication. The next most common access control for end users turned out to be SaaS and World Wide Web sign-on solutions. These access controls were used by 55 percent of survey respondents. Just over 50 percent of respondents reported that their employer relied upon sign-on solutions for enterprise applications.
Once all of the survey’s data is analyzed, it becomes abundantly clear that computer security systems tend to fail quite frequently as a result of stolen credentials. Compromised credentials can lead to the infiltration of even the most supposedly secure systems. The unfortunate truth is that businesses commonly fail in their attempts to limit access to in-house systems to pre-authorized users.
The flaw with credentials is that the vast majority of organizations use the same passwords year after year. Too many business owners, managers and administrators fail to choose complex passwords. Furthermore, most employees do not change their passwords on a regular basis unless prompted by system protocols. Some people actually print out their passwords and tape them to the bottom of their keyboard, mouse, monitor or other cubicle equipment. Some even go as far as using the same passwords over and over across various services. Others are even willing to share their login credentials with co-workers.
There is no longer any doubt as to whether passwords are appropriate for securing access to highly sensitive systems, network and data. Organizations should shift their focus to access control for improved organizational security. The implementation of a two-factor authentication process combined with single use passwords is a cost effective way of preventing inappropriate access to private data.
Secure Your Company’s Sensitive Information With the Assistance of our IT Gurus
Alary Clinitech is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at (416) 291-7377 or send us an email at email@example.com for more information.
Thanks for helping us upgrade our Macs and get them working exactly as our business needs! Fast, convenient and very knowledgeable! You’re the best!
Alary Technologies has been our IT support team for the past year at the START Clinic for Mood and Anxiety Disorders. They have done a excellent job in upgrading our system, organization, and supporting us in technical computer matters. Compared to other IT companies we have worked with, Alary Technologies comes on top. Ahmed Kufaishi the Managing Director at Alary Technologies is solution focused, knowledgeable and makes an effort to really understand his clients’ needs. It has been a pleasure to work with Ahmed and Alary Technologies. I would recommend their services to other companies and clinics.
“We continue to work with Alary Technologies due to the fact that they are quite educated and knowledge based with current upgrades, and their commitment to their customers.”
Ahmed has been providing our company with expert IT services for close to 3 years. He has guided us through hardware upgrades, server back up procedures and was instrumental in brokering a custom software program that fully automated some key functions in our business. Ahmed has always been thoroughly professional in all his dealings with us and has provided consistent and sound advise for all of our IT requirements. We consider Ahmed and Alary Technologies to be an important partner for our business.
It is refreshing to work with someone who can organize things and describe in plain language. I have a large and growing knowledge base for my work as an architect. I have realized that I can’t do everything, that I do need a team member who can look after this one relatively small by crucial part of my practice.