Story image

Widespread mismanagement of privileged accounts and access revealed in global survey

17 Nov 2017

Identity and access management (IAM) company One Identity has released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data.

Among the most eye-opening research findings are that eight in 10 (80%) of Australian respondents admit to facing challenges when it comes to managing privileged passwords, and nearly one in five (17%) still use a paper-based logbook to manage privileged accounts in Australia.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

●        Management platforms and tools: In addition to 17% of Australian respondents admitting to using paper-based logs, a surprising 34 percent are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts -- indicating widespread inconsistency in privileged access management (PAM).

●        Monitoring and visibility: The majority of Australian IT security professionals (71%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 22% of Australian respondents confessed they are unable to monitor or record activity performed with admin credentials, while 34% said they cannot consistently identify individuals who perform admin activities.

●        Password management and change: Globally, an overwhelming 86% of organizations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

“Without taking the very basic but essential steps in employing security and management in regard to privileged accounts, organizations are putting themselves at risk to exposing valuable information. By not implementing vital security methods companies continue to put themselves at risk to breaches that will not only have financial implications, but legal implications once the mandatory breach notification legislation comes into play next year,” says Richard Cookes, One Identity ANZ country manager.

“On top of this, companies can also face data theft and irreversible damage to organizational reputations.”

“This survey indicates quite an alarmingly high percentage of IT professionals don’t have proper security practices in place. These findings show how crucial it is for organizations to reassess and implement strong security procedures regarding privileged access management.” The One Identity Global State of IAM Study consisted of an online survey conducted by Dimensional Research of IT professionals with responsibility for IT security as a major part of their job and were very knowledgeable about IAM.

A wide variety of questions were asked about experiences and challenges with IAM. A total of 913 individuals from the US, Canada, UK, Germany, France, Australia, Singapore and Hong Kong completed the survey.

This report is based on the global study, and One Identity offers a free online executive summary of the data in a Key Findings Report, as well as an illustrated look at the data in an infographic. 

Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.