Why Access Management Is Security's Weak Link
Weak and recycled passwords, along with the lack of a centralized password management policy and a credential management framework, place companies at risk.
Over the last decade, network access has become far more complex. A multitude of systems and devices―interconnected through mobility and clouds―has transformed the way data flows through the enterprise and to other organizations. Unfortunately, this has ratcheted up security risks. A study conducted by BeyondTrust, " IT Needs More Control Over Network Access Privileges ," offers some perspective on the topic. The cyber-security firm surveyed more than 500 senior IT, IS, legal and compliance experts about privileged access management practices. Among the key findings: Weak and recycled passwords are common; many organizations lack a centralized password management policy; and many do not have a credential management framework in place. All of this puts many organizations at greater risk of a breach. Yet, remarkably, addressing the problem isn't overly complex. "This study confirms one of the unfortunate truths about data breaches today―namely, that many are preventable using relatively simple means," observed Kevin Hickey, president and CEO of BeyondTrust.
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).