As if that weren’t bad enough, the survey found that more than one-third of IT professionals admit they could still access their company’s network once they’d left their current job, with no one to stop them.
More than 200 IT professionals participated in the survey with many revealing that although it wasn’t corporate policy to allow IT workers to access systems after termination, still over one-quarter of respondents knew of another IT staff member who still had access to sensitive networks even though they’d left the company long ago.
Post-It Notes: The IT Favourite for Storing Passwords
It seems that very little changes year over year – more than half of people still keep their passwords on a Post-It note, in spite of all the education and reminders to do differently. What’s shocking about this year’s annual survey was that the 50% number now applies to IT professionals as well! More than half of respondents admitted to using Post-It notes to store administrative passwords, the super-powerful codes pre-built into every system such the Administrator ID on your local workstation.
As one IT administrator explained: “Sure, it’s easy for an employee to update the personal password to their laptop, but to change the administrator password on that same machine? It would take days for IT to do them all by hand. In the end, we just pick one password for all the systems and write it down.”
And where do they write it? A Post-It note.
Administrative Passwords Rarely Get Changed
One-fifth of all organizations admitted that they rarely changed their administrative passwords with 7% saying they NEVER change administrative passwords. This may explain why one-third of all people questioned would still have access to their network even if they’d left the company. 8% of IT professionals revealed that the manufacturers default admin password on critical systems had never been changed, which remains the most common way for hackers to break into corporate networks.
Gary McKinnon who is still waiting to be extradited to the US for gaining entry to 90 computers at the US Department of Defense by scanning the US military computer systems for blank administrator accounts, says: “The easiest way to infiltrate a company’s network is to look for administrative passwords which are left blank, still have the manufacturers default password or just use obvious names. Once you find these, which are unbelievably simple and common to find, you’re into the system and have the highest level of authority – bingo you’ve got control of the company’s system.”