1 in 5 IT security pros still use paper to track accounts and passwords
Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that 88 percent of respondents admit to facing challenges when it comes to managing privileged passwords, and 18 percent still use a paper-based logbook to manage privileged accounts.
What types of software or other tools do you use to manage administrative or other privileged accounts?
These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.
The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:
Management platforms and tools
In addition to 18 percent of respondents admitting to using paper-based logs, a surprising 36 percent are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67 percent) of companies are relying on two or more tools to manage these accounts – indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility
The majority of IT security professionals (57 percent) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21 percent of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32 percent said they cannot consistently identify individuals who perform admin activities.
Password management and change
An overwhelming 86 percent of organizations are not consistently changing the password on their admin accounts after each use. Further, 46 percent of IT security administrators don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.
“When an organization doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity. “These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organizations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”
What types of software or other tools do you use to 25% manage administrative or other privileged accounts?
Avoiding primitive management
A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organizations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.