Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    payment methods
    How Data Analytics Is Transforming eCommerce Payments
    10 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Passwords are the Weakest Link in Enterprise IT Security
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Privacy > Passwords are the Weakest Link in Enterprise IT Security
PrivacySecurity

Passwords are the Weakest Link in Enterprise IT Security

JoeMcKendrick
JoeMcKendrick
5 Min Read
SHARE

Organizations are spending millions of dollars to beef up their data, application and network security, but still keep overlooking one obvious area of exposure: user passwords.

The Trustwave 2012 Global Security Report has just been published, identifying areas of vulnerabilities that persist within organizations, and threaten data security. The report’s authors studied more than 300 data breaches that occurred during the year 2011 across 18 countries.

Organizations are spending millions of dollars to beef up their data, application and network security, but still keep overlooking one obvious area of exposure: user passwords.

The Trustwave 2012 Global Security Report has just been published, identifying areas of vulnerabilities that persist within organizations, and threaten data security. The report’s authors studied more than 300 data breaches that occurred during the year 2011 across 18 countries.

The report observes that cyber attacks continue to rise unabated, and hackers are increasingly going after businesses’ customer records. The risk is even greater for businesses frequented by consumers and brand name chains.

Technology solutions include Web application firewalls and network access control, and the data itself, such as encryption and data loss prevention.

However, much of the challenge comes from organizational and management issues. In 76% of incident response investigations, a third party responsible for system support, development and/or maintenance of business environments introduced the security deficiencies, the report observes. For Web-based attacks, SQL injection remains the number-one attack method for the fourth year in a row.

The report devotes most of its pages to the matter of weak password protection. Eighty percent of the security incidents studied by Trustwave were due to the use of weak administrative credentials. “The use of weak and/or default credentials continues to be one of the primary weaknesses exploited by attackers for internal propagation,” the report observes. “This is true for both large and small organizations, and largely due to poor administration.”

For example, in one instance, attackers were able to compromise as many as 250 unique critical systems at a single target location by exploiting duplicate credentials, the report says.

In fact, in many cases, thanks to lax or well-known default passwords, companies made it relatively easy for hackers and attackers to break in, and they didn’t even need to use sophisticated methods of attack, the report states.  In fact, the password most widely used across the sites studied by Trustwave is “Password1.” In addition, default passwords were used across a range of servers, network equipment, and client devices.  Other common password combinations were “pitifully simple,” the report’s authors note — such as administrator:password, guest:guest, and admin:admin.

Trustwave identified the top overused passwords found in its survey. Variations of “password” made up about 5% of passwords and 1.3% used “welcome” in some form:

  1. Password1
  2. welcome
  3. password
  4. Welcome1
  5. welcome1
  6. Password2
  7. 123456
  8. Password01
  9. Password3
  10. P@ssw0rd
  11. Passw0rd
  12. Password4
  13. Password123
  14. Summer09
  15. Password6
  16. Password7
  17. Password9
  18. Password8
  19. password1
  20. Welcome2
  21. Welcome01
  22. Winter10
  23. Spring2010
  24. Summer11
  25. Summer2011

Note the prevalence of seasonal and date-related passwords. No doubt there are many systems with logins such as ‘Spring12′ now about to pop up.

One of the biggest issues is the fact that many applications and devices are shipped or installed with default usernames and passwords, often with full access rights. “These default passwords are frequently not changed, which can allow an attacker to use them to gain access,” states the report.

“Systems using shared administrative username and password combinations, as well as mapped drives and open-by-default Windows hidden shares, enabled attackers to quickly identify additional targets, gain credentials and administrative access and then subsequently deploy their malware. These types of attacks can propagate across an entire small network (between one and 20 devices) in less than 10 minutes.”

(Photo by Joe McKendrick.)

TAGGED:password security
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

payment methods
How Data Analytics Is Transforming eCommerce Payments
Analytics Big Data Exclusive
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security
ai for making lyric videos
How AI Is Revolutionizing Lyric Video Creation
Artificial Intelligence Exclusive
intersection of data and patient care
How Healthcare Careers Are Expanding at the Intersection of Data and Patient Care
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Passwords Suck: Learn About and Use Multi-Factor Authentication

5 Min Read
ai underscores risks of passwordless authentication
Artificial Intelligence

AI Underscores Passwordless Authentication Risks for Internet Users

6 Min Read

Ryan Kamauff on Password Protection

2 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?