Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/22/2016
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

OneLogin Study: Employees Exposing Employers to Security Risks

SAN FRANCISCO, Calif., June 21, 2016 - OneLogin, the identity management provider bringing speed and integrity to the modern enterprise, today announced new research that demonstrates that U.S. employees have digital device practices that are exposing their employers to increased security risks.

According to research conducted by Arlington Research, on behalf of OneLogin, based on a survey of 1,022 respondents in the U.S. in May 2016:

  • Employees are putting corporate networks at risk: 13 percent let their colleagues use a device that can access their employer’s network. Nine percent allow their partners to access such a device, and one percent even permit their children to use such a device.
  • Password-sharing is rampant, with 20 percent of employees sharing their work email password, and 12 percent sharing passwords to other work applications. Nearly half of all employees are unaware of any company policies around sharing of these passwords.
  • Mobile device security is lax. One in five employees do not have any security software on their work devices, beyond what ships with the operating system.

“Security breaches are a near-daily occurrence in the news. Given that it takes only one compromised account to lead to a breach, these lax security practices are troubling, especially when you consider that they could take place at your bank, at your children’s school, or in your local government. A breach at one location can lead to others, especially with bad password habits like password reuse,” said Alvaro Hoyos, Chief Information Security Officer at OneLogin. “Technical controls should be put in place to ensure only authorized workers are accessing data securely and these should be reinforced with security awareness efforts as well. For example, using single sign-on and identity management solutions to enforce role based access and step up authentication establishes a strong security foundation, and coupling that with periodic security awareness training or simple reminders, strengthens that foundation.”

Nowadays, companies have a plethora of security solutions available to help manage these threats. Compiling a comprehensive list would be a daunting task, so here are a few practical ones that you can easily deploy:

  • Multifactor Authentication (MFA), which prompts employees to authenticate using their phone when they log into applications remotely. This is especially useful for modern enterprises, since 55 percent of workers access work applications away from the office, according to Arlington Research.
  • Security policies, that are not too onerous for employees and are commensurate with the risks and the importance of the asset being protected. Meaning, sometimes deploying a drawbridge will get the job done better than a crocodile filled moat.
  • Awareness, awareness, awareness. All the moats in the world are not going to protect you from employees bringing their canoes to work that don’t know or understand the purpose of the moat. Not only should employees be made of aware of company policies, they should also know how it can impact their personal lives as well. To be blunt, if employees understand they have “skin in the game” in both their personal and professional lives when it comes to security, they will take security awareness training more seriously and this will improve knowledge retention as well.

“OneLogin’s mission is to enhance the security of the modern enterprise, which is becoming increasingly borderless as employees embrace remote work,” said Al Sargent, Senior Director at OneLogin. “The rampant use of mobile devices to access corporate applications means that companies cannot rely on perimeter security; they must secure at the point of authentication. Thankfully OneLogin makes it easy for IT teams to adjust to this new reality.”

Resources

About OneLogin, Inc. 

OneLogin brings speed and integrity to the modern enterprise with an award-winning single sign-on (SSO) and identity management platform. Our portfolio of solutions secure connections across all users, all devices, and every application, helping enterprises drive new levels of business integrity and operational velocity across their entire app portfolios. The choice for innovators of all sizes such as Condé Nast, Pinterest and Steelcase, OneLogin manages and secures millions of identities around the globe. We are headquartered in San Francisco, California. For more information, visitwww.onelogin.comblogFacebookTwitter, or LinkedIn.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...