Story image

Widespread mismanagement of privileged accounts and access revealed in global survey

17 Nov 17

Identity and access management (IAM) company One Identity has released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data.

Among the most eye-opening research findings are that eight in 10 (80%) of Australian respondents admit to facing challenges when it comes to managing privileged passwords, and nearly one in five (17%) still use a paper-based logbook to manage privileged accounts in Australia.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

●        Management platforms and tools: In addition to 17% of Australian respondents admitting to using paper-based logs, a surprising 34 percent are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts -- indicating widespread inconsistency in privileged access management (PAM).

●        Monitoring and visibility: The majority of Australian IT security professionals (71%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 22% of Australian respondents confessed they are unable to monitor or record activity performed with admin credentials, while 34% said they cannot consistently identify individuals who perform admin activities.

●        Password management and change: Globally, an overwhelming 86% of organizations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

“Without taking the very basic but essential steps in employing security and management in regard to privileged accounts, organizations are putting themselves at risk to exposing valuable information. By not implementing vital security methods companies continue to put themselves at risk to breaches that will not only have financial implications, but legal implications once the mandatory breach notification legislation comes into play next year,” says Richard Cookes, One Identity ANZ country manager.

“On top of this, companies can also face data theft and irreversible damage to organizational reputations.”

“This survey indicates quite an alarmingly high percentage of IT professionals don’t have proper security practices in place. These findings show how crucial it is for organizations to reassess and implement strong security procedures regarding privileged access management.”

The One Identity Global State of IAM Study consisted of an online survey conducted by Dimensional Research of IT professionals with responsibility for IT security as a major part of their job and were very knowledgeable about IAM.

A wide variety of questions were asked about experiences and challenges with IAM. A total of 913 individuals from the US, Canada, UK, Germany, France, Australia, Singapore and Hong Kong completed the survey.

This report is based on the global study, and One Identity offers a free online executive summary of the data in a Key Findings Report, as well as an illustrated look at the data in an infographic. 

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.