Compromised credentials are still the cause of almost a quarter of all data breaches, according to a new Cloud Security Alliance (CSA) survey titled, Identity Solutions: Security Beyond the Perimeter.
In February 2016, the CSA released a report titled The Treacherous Twelve: Cloud Computing Top Threats in 2016, which revealed top concerns of IT security professionals in cloud computing. Data breaches, account hijacking and malicious insiders all rated as top threats. These attacks often occur because of a lack of scalable identity access management systems, failure to use multifactor authentication, insufficient password use and a lack of ongoing automated rotation of cryptographic keys, passwords and certificates. As such, it’s not surprising that insufficient identity, credential and access management ranked as the top vulnerability in today’s released findings.
Key findings include:
- Of those who indicated their company reported a data breach, 22 per cent of respondents noted the breach was due to compromised credentials. In addition, 65 per cent of respondents indicated that the likelihood their company would experience a future breach due to compromised credentials was medium to high.
- Surprisingly, there were no significant differences in security solutions used between respondents who reported a breach and those who either did not report or did not know of a reported breach in their organisations.
- Companies embracing big data solutions consistently adopted more perimeter and identity security solutions.
- 76 per cent of internal access control policies extended to outsourced IT, vendors and other third parties.
“The survey findings reiterate that compromised credentials are a leading point of attack used in data breaches,” said Bill Mann, chief product officer for Centrify. “We hope that these findings will encourage organisations to leverage single sign-on, multi-factor authentication, mobile and Mac management, along with privileged access security and session monitoring, in order to minimize attack surfaces, thwart in-progress attacks and achieve continuous compliance. It’s also critical that companies secure internal and external users as well as privileged accounts – and it’s great to see that many organisations are already taking that step and extending access control policies to third parties.”
The full report can be found here.
Figures prompt calls for charities to ensure they use all methods possible to protect online transactions and customer data
Spending via contactless payment cards rises rapidly
Payments provider sees double-digit growth in contributions and an increase in mobile giving
Zoe Amar discusses how charities can get to grips with social media in just 30 minutes a day