Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Cloakware Survey: Acceptable Security Controls A Rarity

Most companies rely on antiquated security procedures that don't account for widespread corporate layoffs or the realities of a more virtual workforce, according to study of 12,500 U.S. infosec pros

Vienna, VA -- April 8, 2009 -- Amid tightening budgets and streamlining operations, most companies are still relying on antiquated security procedures that don't take the actuality of widespread corporate layoffs, or the realities of a more virtual workforce into account. According to a new survey of U.S. security industry professionals, 14 percent of former company employees still have access to proprietary data and organizational information, revealing critical deficiencies of corporate security policies.

Conducted of more than 12,500 U.S.-based security industry professionals by datacenter security experts at Cloakware, the study found three-quarters of those surveyed work at companies of 1,000 people or more. A simple calculation based on respondents' replies reveals that a minimum of 1,312,500 employees still have access to company systems after they have left the organization.

As part of cost-saving measures, many of these companies are now allowing more employees to work remotely, yet failing to update their security controls. In fact, 90 percent of companies that responded employ virtual workers who do business beyond the four walls of the traditional office. Almost half of the respondents (41 percent) said they have increased their use of virtual workers over the past 12 months, providing more complex security issues that need to be addressed.

Still many companies continue to use basic passwords and new-employee set-up policies that make it easy to introduce vulnerabilities. Additionally, remote access is often managed by multiple internal groups within a company, resulting in 21 percent of responding companies admitting that they hadn't even changed employees' passwords after they were terminated.

"With companies facing dwindling margins, reducing overhead costs is driving a change in employee work arrangements, but it also reveals weak protection practices " a critical issue for long-term security," said David Canellos, president and chief operating officer of Cloakware. "Simply put, insufficient security and access management practices can be detrimental to a company's business, and companies are only beginning to realize the need for more stringent standards to govern access to their critical information and protect their crucial company assets."

All the responding security professionals said they allow some level of remote access privileges for employees, yet the survey found that the vast majority of companies aren't doing anything beyond rudimentary security to protect company assets.

The survey found:

  • A disconnect between departments as to which group "owns" access for employees: For companies, the administrator charged with cutting off access to critical company information is ever-changing. According to responding companies, two-thirds of the time, IT departments are tasked with this responsibility, but many companies delegate it to human resources and direct managers, often revealing a disconnect that leaves companies vulnerable to malicious former employee attacks.

  • Varied internal password management policies: While all respondents reported that their companies have mandated password change policies, vigilance toward frequent updates is often lax. More than three-quarters of respondents reported that changing passwords is mandated, either monthly (31 percent of those who make it a practice) or quarterly (69 percent). Yet only one-fifth of companies provide an automated password update function that forces employees to actually change it.

  • Simplistic security practices around setting up new-employee access: More than 80 percent of those surveyed reported that companies have a standard format for new employee access, i.e., all e-mail address and password setup is the same. This makes it extremely easy to take advantage of a new co-worker's access to critical company resources.

    "The worldwide economic crisis, with its waves of employee downsizing in virtually every region and every industry, is raising intense enterprise concern about the impact of these events on information security," wrote Gartner, Inc. analysts Ant Allan, Jay Heiser and Roberta Witty in their report, "Best Practices in Information Security Before, During and After Employee Downsizing," published on Feb. 3, 2009. "The likelihood of these types of loss and damage increases during periods of economic difficulty and uncertainty, but their negative impacts can be reduced and mitigated if they are planned for explicitly."

    The survey was conducted in March 2009 via e-mail among more than 12,500 security industry executives and practitioners in organizations with more than 1,000 employees across a wide range of vertical industries, including government, financial services, healthcare, retail and utilities.

    For more information on best practices for managing access and privileged passwords, visit http://datacenter.cloakware.com/.

    About Cloakware Cloakware, an Irdeto company and part of the Naspers group, provides innovative, secure, proven software technology solutions that enable customers to protect business and digital assets in enterprise, consumer and government markets. Cloakware's two main product lines include; Cloakware Datacenter Solutions which help organizations meet governance, risk management and compliance (GRC) objectives for privileged password management while ensuring business continuity and the security of mission-critical data and IT infrastructure. Cloakware Consumer Product Solutions protect software and content on PCs, set-top boxes, mobile phones and media players. Protecting more than one billion deployed applications, Cloakware is the security cornerstone of many of the world's largest, most recognizable and technologically advanced companies. Headquartered in Vienna, VA and Ottawa, Canada, Cloakware has regional sales offices worldwide. www.cloakware.com

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Navigating Security in the Cloud
    Diya Jolly, Chief Product Officer, Okta,  12/4/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-16772
    PUBLISHED: 2019-12-07
    The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
    CVE-2019-9464
    PUBLISHED: 2019-12-06
    In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
    CVE-2019-2220
    PUBLISHED: 2019-12-06
    In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
    CVE-2019-2221
    PUBLISHED: 2019-12-06
    In hasActivityInVisibleTask of WindowProcessController.java there?s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ...
    CVE-2019-2222
    PUBLISHED: 2019-12-06
    n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...