• About Us
Thursday, 12 December, 2019
IT Security Guru
Advertisement
  • Latest News
  • About Us
  • Topics
    • Cloud Security
    • Compliance News
    • Contactless News
    • Breaking Cyber News
    • Data Protection
    • DDoS News
    • Featured
    • Guru Picks
    • Hacking News
    • Malware News
    • Mobile Security
    • Network Security
    • News
      • Editor’s News
      • Top 10 Stories
      • This Week’s Gurus
      • Opinions & Analysis
    • Security News
    • Threat Detection
  • Product Reviews
No Result
View All Result
  • Latest News
  • About Us
  • Topics
    • Cloud Security
    • Compliance News
    • Contactless News
    • Breaking Cyber News
    • Data Protection
    • DDoS News
    • Featured
    • Guru Picks
    • Hacking News
    • Malware News
    • Mobile Security
    • Network Security
    • News
      • Editor’s News
      • Top 10 Stories
      • This Week’s Gurus
      • Opinions & Analysis
    • Security News
    • Threat Detection
  • Product Reviews
No Result
View All Result
IT Security Guru
No Result
View All Result

Five years later: Have you changed your LinkedIn password yet?

by The Gurus
July 24, 2017
in This Week's Gurus

The fallout of data breaches has long lasting effects – as we’ve seen from the continued impact of the 2012 data breach at LinkedIn. Although the attack happened five years ago, the ripple effects continue to this day. Recent reports of credentials stolen from U.K. officials are a good demonstration of this.
Email addresses and passwords of MPs, parliamentary staff, diplomats and senior police officers were sold, bartered and then made available for free on Russian-speaking hacking forums. In total, over 9,000 stolen credentials were publicly released – with the most common passwords associated with the stolen police emails being “police,” “password,” and “police1.” Sources report that a majority of these passwords came from previous data breaches, such as the LinkedIn hack.
This is yet another example of the “domino effect” that breaches can have across multiple Internet services – and it shows that people still aren’t learning their basic security lessons. We’re still seeing hackers use credentials stolen from one breach to carry out additional cyberattacks on other Internet services where those credentials were reused.
Poor password hygiene practices like these are a struggle for individuals and organisations alike. When analysing the results of last year’s annual Market Pulse survey, SailPoint found that 65 percent of the respondents surveyed admitted to using one single password for multiple applications, while 33 per cent stated they share passwords with coworkers! These risky practices leave businesses vulnerable to cyberattacks.
Ensuring that employees maintain strong password hygiene across all on premise and cloud applications is a significant challenge in a corporate environment.  It is complicated even further by the constant change in employee roles and responsibilities, requiring their application access profiles to change continually.  This is just one of the reasons why so many enterprises are increasingly turning to identity governance – to enable and enforce good password management policies and behaviors across the company while simultaneously ensuring the appropriate level of user access is maintained at all times.
Throughout my career as an IT leader, I’ve seen firsthand the benefits of putting an identity governance solution in place and how it can transform key aspects of an organisation’s security posture.  Identity governance does require investment and commitment by an organisation, along with ongoing education on the critical importance of identity and security best practices. However, in exchange for that commitment, you will benefit from one of the most effective, time-tested methods of ensuring user access security across the board – protecting your applications and your data and stopping the ‘domino effect’ in its tracks.
By Kevin Hansel, CIO at SailPoint

FacebookTweetLinkedIn
Tags: cybersecuritydata breachLinkedInsecuritytech
Previous Post

The 2017 Fappening: Kylie Jenner Hacked, Nude Photos Could Be Leaked

Next Post

Businesses must be savvy to mobile security threats as app adoption spikes

Leave a Reply

avatar
500
This comment form is under antispam protection
avatar
500
This comment form is under antispam protection
  Subscribe  
Notify of
IT Security Guru

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

wpDiscuz

This site uses functional cookies and external scripts to improve your experience.

More information
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept