{"id":70799,"date":"2014-07-17T16:11:15","date_gmt":"2014-07-17T20:11:15","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-09-15T12:04:34","modified_gmt":"2022-09-15T16:04:34","slug":"can-former-staff-still-access-secure-info","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/can-former-staff-still-access-secure-info\/","title":{"rendered":"Can Former Staff Still Access Secure Info?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-104716 size-medium\" title=\"Can Former Staff Still Access Secure Info?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/escalator-e1568756552423-148x150.jpg?resize=148%2C150&#038;ssl=1\" alt=\"Can Former Staff Still Access Secure Info?\" width=\"148\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/escalator-e1568756552423.jpg?resize=148%2C150&amp;ssl=1 148w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/escalator-e1568756552423.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/escalator-e1568756552423.jpg?w=361&amp;ssl=1 361w\" sizes=\"auto, (max-width: 148px) 100vw, 148px\" \/><a href=\"http:\/\/www.infosecurity-magazine.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>InfoSecurity Magazine<\/em><\/a> recently published an <a href=\"http:\/\/www.infosecurity-magazine.com\/view\/38632\/significant-percentage-of-exemployees-can-still-access-privileged-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> that blames <strong>cavalier<\/strong> attitudes about <strong>password management<\/strong> for a new era of <strong>data breaches<\/strong>. The article says that a <strong>fundamental lack of IT security awareness<\/strong> in enterprises, particularly in the arena of controlling privileged logins, is potentially paving the way for a further wave of data breaches.<\/p>\n<p>The author cites a <a title=\"Information Security Survey 2014\" href=\"https:\/\/web.archive.org\/web\/20171220102408\/http:\/\/go.liebsoft.com:80\/Information-Security-Survey-2014\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a> from <a title=\"Lieberman Software\" href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/lieberman-software-acquired\" target=\"_blank\" rel=\"noopener noreferrer\">Lieberman Software<\/a> of IT security professionals. In the survey, 13% of IT security pro&#8217;s interviewed at the <a title=\"RSA Conference 2014\" href=\"https:\/\/web.archive.org\/web\/20190712033801\/https:\/\/www.rsaconference.com\/events\/us14\" target=\"_blank\" rel=\"noopener noreferrer\">RSA Conference 2014<\/a> in San Francisco\u00a0admit to being able to <strong>access previous employers\u2019 systems<\/strong> using their old credentials.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160611044504\/http:\/\/blog.etech7.com\/blog\/bid\/156041\/What-Type-Of-Businesses-May-Benefit-From-Data-Backup-Services\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104719 size-medium\" title=\"access previous employers\u2019 systems using their old credential\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390-150x53.jpg?resize=150%2C53&#038;ssl=1\" alt=\"access previous employers\u2019 systems using their old credential\" width=\"150\" height=\"53\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390.jpg?resize=150%2C53&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390.jpg?resize=75%2C27&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390.jpg?resize=768%2C273&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390.jpg?resize=1024%2C363&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/FOLDER_ACCESS-e1568756168390.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Perhaps even more alarming is that of those able to get access to previous employers\u2019 systems nearly 23% can get into their previous two employers\u2019 systems <strong>using old credentials<\/strong>. And, shockingly, more than 16% admit to still having access to systems at all previous employers Lieberman reports. <a title=\"Philip Lieberman, CEO\" href=\"https:\/\/web.archive.org\/web\/20160207172445\/http:\/\/liebsoft.com\/executive_management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Philip Lieberman<\/a>, CEO and president of the company, told <em>InfoSecurity<\/em> in an interview that he <strong>blames executives<\/strong> who are satisfied with only<strong> meeting minimum security requirements<\/strong>.<\/p>\n<p style=\"padding-left: 30px;\"><em>Investments in security for technology, people, and processes have been meager, at best, in most organizations for many years &#8230; many C-level executives have been strongly discouraged from implementing anything other than the minimum security required by law.<\/em><\/p>\n<p><a href=\"https:\/\/hr.blr.com\/HR-news\/Performance-Termination\/Employee-Termination-with-Discharge\/HR-questions-from-our-readers-Can-we-terminate-thi#\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104721\" title=\"don't have, a policy to make sure that former employers can no longer access systems\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/MAN_FIRED.jpg?resize=90%2C91&#038;ssl=1\" alt=\"don't have, a policy to make sure that former employers can no longer access systems\" width=\"90\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/MAN_FIRED.jpg?resize=148%2C150&amp;ssl=1 148w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/MAN_FIRED.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/MAN_FIRED.jpg?w=197&amp;ssl=1 197w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>The survey also showed a communications breakdown between the IT Pros and management. Nearly one in five respondents admit that they do not have, or <strong>don&#8217;t know<\/strong> if they have, a <strong>policy<\/strong> to make sure that <strong>former employers and contractors can no longer access systems after leaving<\/strong> the organization according to the article.<\/p>\n<p>The survey also found that current employees are also a concern. The <em>InfoSecurity<\/em> article says that almost 25% of employees surveyed said that they work in organizations that <strong>do not change their service and process account passwords within the 90-day<\/strong> time frame commonly cited as best practice by most regulatory compliance mandates. Lieberman pointed out that users who run with elevated privileges can introduce all sorts of IT headaches by downloading and installing applications, and changing their system configuration settings. CEO\u00a0Lieberman warned that an organization would be wise to strictly control and monitor the privileged actions of its users by:<\/p>\n<ol>\n<li><strong>Get control over privileged accounts<\/strong>. Start by generating unique and complex passwords for every individual account on the network \u2013 and changing these passwords often (no more shared or static passwords).<\/li>\n<li>Make sure you\u2019re <strong>securely storing current passwords<\/strong> and making them available only to <strong>delegated staff<\/strong>, for <strong>audited<\/strong> use, for a <strong>limited time<\/strong> (no more anonymous and unlimited privileged access \u2013 for anyone).<\/li>\n<li><strong>Automate<\/strong> the entire process with an enterprise-level privileged identity management approach. Mr. Lieberman argues, \u201c<em>when users exhibit poor behavior while logged into their powerful privileged accounts, you can be immediately alerted and respond to the threat.<\/em>\u201d<\/li>\n<\/ol>\n<p><a href=\"https:\/\/web.archive.org\/web\/20180823102332\/http:\/\/remuvebedbugs.com\/page\/4\/Don%5C%27t_Bury_Your_Head_In_The_Sand\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-104723 size-medium\" title=\"half-life mentality of opening the pocketbook for security investments immediately after a data breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand-3.jpg?resize=150%2C83&#038;ssl=1\" alt=\"half-life mentality of opening the pocketbook for security investments immediately after a data breach\" width=\"150\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand-3.jpg?resize=150%2C83&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand-3.jpg?resize=75%2C41&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand-3.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Mr. Lieberman told <em>InfoSecurity<\/em> that In the wake of the <a title=\"Edward Snowden\" href=\"https:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noopener noreferrer\">Edward Snowden<\/a> \/ <a title=\"National Security Agency\" href=\"https:\/\/www.nsa.gov\" target=\"_blank\" rel=\"homepage noopener noreferrer\">NSA<\/a> scandal and the <a title=\"Target data breach\" href=\"http:\/\/www.ibtimes.com\/timeline-targets-data-breach-aftermath-how-cybertheft-snowballed-giant-retailer-1580056\" target=\"_blank\" rel=\"noopener noreferrer\">Target breach<\/a>, one would think that corporations would feel that minimizing the insider threat and the attempts of sophisticated criminal hackers to groom those with privileged accounts would be of tantamount importance. But, Lieberman cited a \u201c<em>half-life mentality of opening the pocketbook for security investments immediately after a data breach occurs, but then diminishing back to basic security after a few months.<\/em>\u201d<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>When an employee leaves the company, it\u2019s imperative to ensure that he or she is not taking the password secrets that can gain access to highly sensitive systems. <\/em><\/p>\n<p><em>To back this up, <a title=\"Download Verizon 2013 DBIR\" href=\"http:\/\/www.verizonenterprise.com\/DBIR\/2013\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon\u2019s 2013 annual Data Breach Investigations Report<\/a> says that more than three-quarters (76%) of network intrusions relied on weak or stolen credentials \u2013 a risk that Verizon describes as \u201ceasily preventable\u201d.<\/em><\/p>\n<p><em>Creating Privileged Accounts:<\/em><\/p>\n<ul>\n<li><em>Never issue direct access to Administrator or Root, create a unique alias.<\/em><\/li>\n<li><em>Require password complexity, history and expiration. <\/em><\/li>\n<\/ul>\n<p><em>Disabling Privileged Accounts:<\/em><\/p>\n<ul>\n<li><em>Get the termination notice in writing from someone up the food chain before acting, then disable the account ASAP.<\/em><\/li>\n<li><em>Disable the account, Lock the account, Change the password.<\/em><\/li>\n<li><em>Don&#8217;t change the user name or delete the account until you are sure. Prematurely removing an Admin Account could break some applications or connectors.<\/em><\/li>\n<li><em>Don&#8217;t forget about other accounts, email, VPN, wipe mobile devices, access control PINs.<\/em><\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li>Protecting Against the Insider Threat (duosecurity.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A survey from Lieberman Software says many former staff can still access previous employers\u2019 systems using their old credentials.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,2192,2364,208,209,2193,2191,4],"class_list":["post-70799","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-computer-security","tag-edward-snowden","tag-lieberman","tag-password","tag-password-management","tag-privileged-identity-management","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=70799"}],"version-history":[{"count":15,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70799\/revisions"}],"predecessor-version":[{"id":132836,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70799\/revisions\/132836"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=70799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=70799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=70799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}