Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/30/2013
03:54 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Employee Negligence Makes U.K. 'Sitting Duck' For Cybercrime

Swivel Secure survey reveals that almost a fifth of employees reuse same username and password across every single online business and personal application

30 April 2013 – Wetherby, UK – Britain is a sitting duck for cybercrime because employees couldn't care less about the security of their workplace systems, suggests new research* announced today from tokenless authentication provider, Swivel Secure.

The study reveals that almost a fifth (19%) of employees care so little about online security that they reuse the same username and password (UNP) across every single online business and personal application which, for the majority of today's consumers, amounts to upwards of 25 different sites. Constant reuse of the same UNP greatly increases the chances of a fraudster, data thief, saboteur, friend or fellow employee obtaining and exploiting these details for criminal gain.

Contrary to popular belief, awareness of the dangers of cybercrime amongst workers doesn't seem to be the problem; over half (55%) of the 1,200 UK employees surveyed claim to actively track online security threats such as viruses, trojans and hackers. The real peril lies in what seems to be a widely held concensus amongst workers that cybercrime is 'something that happens to other businesses'. Despite this disparity between awareness and action, more than three quarters of all respondents (77%) remained completely unconcerned about workplace security, suggesting that only a direct and personal experience of cybercrime will trigger a change in attitude. Even those that are security conscious are failing to uphold basic rules; three quarters (75%) either write down or have another offline system for recording their passwords.

"This has been going on for long enough," comments Chris Russell, VP Engineering at Swivel Secure. "The cloud's over reliance on the username and password format has caused workers to resign themselves to the risks, and made the UK economy a sitting duck for corporate cybercrime. The inconvenient truth is that workers are neither capable nor are they willing to maintain the complex, rolling system of passwords that today's web environment demands.

"Analysts tell us that global spending on cyber security will exceed $68bln this year, but it is nonsensical for a business to invest heavily in firewalls, encryption and all manner of other protective technologies if its workers are effectively lowering the drawbridge to anyone that can guess their Facebook password," continues Russell. "As our personal and professional worlds continue to collide online, businesses that are serious about protecting their data need to rethink their approach to user authentication and drop usernames and passwords for good."

Additional research announced earlier this year from Swivel Secure (UK Bosses Slacking on Hacking, Jan 2013) suggested that the UK's 'corporate culture of complacency' start at the top and trickles down to influence the attitudes and behaviours of employees. "Action on this issue has to come from the top," adds Russell. "The business owners and decision makers must accept that UNPs are an outdated and unworkable form of authentication for today's online workforce. If they wait for the web to evolve around them, it will be too late. They need to take steps now to protect their data."

The Swivel authentication platform was first launched in 2003. It is now used by local government, the NHS, major global enterprises and smaller businesses in over 35 countries, to remotely access their business networks, virtual desktops and cloud-based applications. A strong alternative to UNPs, the Swivel authentication platform offers the widest range of user deployment options according to Gartner, including mobile apps, SMS and interactive voice response channels.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-20466
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 is vulnerable to unauthorized access via user_edit_password.php, remote attackers can modify the password of any user.
CVE-2020-20467
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 is vulnerable to sensitive information disclosure via default_task_add.php, remote attackers can exploit the vulnerability to create a task.
CVE-2020-20468
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 is vulnerable to CSRF. Attackers can use the user_edit_password.php file to modify the user password.
CVE-2021-24368
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.