• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Network Security

Security Tips for Network Protection against Hackers; MASTER

Lieberman Software president and CEO Philip Lieberman offers practical network security advice for protecting against hacking.

February 26, 2012 TD Staff Leave a Comment

It’s always easy in hindsight, but today it seems clear that the criminals behind recent, high-profile cyber attacks weren’t necessarily computer geniuses — just good opportunists. They were able to exploit human nature and then abuse an open door they knew they’d find.

These hackers utilize creative tactics such as highly targeted spear-fishing emails that lure unsuspecting users to open a malicious attachment, and then deploy zero-day malware onto a user’s computer. From that single computer inside an organization, the attackers can then exploit weak, shared privileged accounts to take control of systems throughout the victims’ network, map its infrastructure and extract sensitive information. Simple, but highly effective.

Potentially vulnerable privileged accounts are found everywhere in the IT infrastructure — on host computer operating systems, in network appliances and backup systems and in line-of-business software. Privileged accounts can be categorized into three primary groups:

  • Super-user login accounts utilized by individuals to configure, run and install applications, change system settings, handle routine administrative duties, and perform emergency fire-call repairs.
  • Service accounts that require privileged login IDs and passwords to run.
  • Application-to-application passwords used by web services, line-of-business applications and custom software to connect to databases, middleware, and so on.

The passwords that control access to privileged accounts are ultimately the main obstacle standing between hackers and your organization’s private data. However, all too often these credentials are not adequately secured, monitored, and audited.

Why Privileged Accounts Are at Risk

Because privileged accounts aren’t even recognized by Identity Access Management (IAM) systems, most organizations have no automated way to manage these powerful accounts. Today’s IT security regulations — mandated by government and industry groups alike — require organizations to frequently update privileged account credentials and audit their use. Yet updating these accounts with scripts or by hand often proves too time-consuming and error-prone to be practical. To further complicate the process, manual changes can cause service outages if personnel fail to account for interdependencies between different privileged accounts. Therefore, many organizations simply ignore the problem.

Unfortunately the security risks introduced by weak privileged account security don’t stop at your data center door. More and more of the shared services that your organization probably uses — including cloud services, certificate authorities, and financial service gateways, to name a few —& have been exposed as having weak or non-existent privileged account security. To a hacker, the shared, cryptographically weak privileged logins used by service provider staff look like an incredibly attractive target — especially since in these environments a single compromised login can expose the private data of scores of corporate customers.

Secure the Keys

While it might seem like a daunting prospect to secure your privileged accounts, you can start to take control with just three simple steps.

    • Step One: Find the Keys —  You need to carry out a top-to-bottom audit of your entire network to determine exactly where all your privileged accounts reside. This should include cataloging whether the logins are sufficiently unique and complex, and whether they are changed often enough to be secure. At this point some readers might throw their arms up despair, since cataloging potentially thousands of privileged logins in a typical data center is no easy task. Never fear, companies can provide point-in-time privileged account audits to qualified organizations, usually without charge.
    • Step Two: Lock the Doors — Deploy the basic automation necessary to close any discovered security holes. There are cost-effective solutions available that can not only secure these accounts on very large networks but do so in hours or days, rather than months.
    • Step Three: Secure the Windows — There’s no point securing your network if critical external elements are left vulnerable. Demand that your key business partners — including cloud service providers, certificate authorities, and others — demonstrate that they’re in compliance with meaningful mandates like the Consensus Audit Guidelines. I’d argue that if they offer self-certifications like SAS70, they don’t take the problem seriously and will eventually leave you exposed.

Hackers have demonstrated that they can penetrate any corporate network. In the past few months the intruders seem to be gaining even more of an upper hand, as word has leaked out that perhaps four more certificate authorities have been compromised in attacks similar to that suffered by DigiNotar.

Many organizations seem to be reeling from the severity of the situation, and some have responded with panic and confusion as they hurry to latch the doors while leaving the keys in the locks. Your data center relies on privileged identities to function and that’s not going to change. However, failure to protect these accounts will leave your private data exposed. We’ve explained the risks but, at the end of the day, it’s up to you. Are you going to protect the keys to your kingdom?

Philip Lieberman is the president and CEO of Lieberman Software, a security software company.

Tagged With: Antivirus, Corporate, Data Backup & Recovery, Data Security, Disaster Recovery, Malware Protection

Related Content:

  • CIO, CISO cyber attack confidence Half of Global CISOs Feel Unprepared to Cope…
  • Microsoft Passwordless, Password Security, managing passwords We’re Still Managing Passwords With Office Docs and…
  • Cryptojacking, Sysrv Microsoft: Watch Out For This New Sysrv Botnet…
  • cybersecurity, business. MAPP, Syxsense Syxsense Joins Microsoft Active Protections Program (MAPP)

Free downloadable guide you may like:

  • These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

    Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a variety of sources, including Indeed, Robert Half, CompTIA and others.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.