Poor password practices put UK businesses at risk
Posted on 30 April 2013.
Britain is a sitting duck for cybercrime because employees couldn’t care less about the security of their workplace systems, according to research by Swivel Secure.

Almost a fifth (19%) of employees care so little about online security that they reuse the same username and password (UNP) across every single online business and personal application which, for the majority of today’s consumers, amounts to upwards of 25 different sites. Constant reuse of the same UNP greatly increases the chances of a fraudster, data thief, saboteur, friend or fellow employee obtaining and exploiting these details for criminal gain.

Contrary to popular belief, awareness of the dangers of cybercrime amongst workers doesn’t seem to be the problem; over half (55%) of the 1,200 UK employees surveyed claim to actively track online security threats such as viruses, trojans and hackers. The real peril lies in what seems to be a widely held concensus amongst workers that cybercrime is ‘something that happens to other businesses’.

Despite this disparity between awareness and action, more than three quarters of all respondents (77%) remained completely unconcerned about workplace security, suggesting that only a direct and personal experience of cybercrime will trigger a change in attitude. Even those that are security conscious are failing to uphold basic rules; three quarters (75%) either write down or have another offline system for recording their passwords.

“This has been going on for long enough,” comments Chris Russell, VP Engineering at Swivel Secure. “The cloud’s over reliance on the username and password format has caused workers to resign themselves to the risks, and made the UK economy a sitting duck for corporate cybercrime. The inconvenient truth is that workers are neither capable nor are they willing to maintain the complex, rolling system of passwords that today’s web environment demands.

“Analysts tell us that global spending on cyber security will exceed $68bln this year, but it is nonsensical for a business to invest heavily in firewalls, encryption and all manner of other protective technologies if its workers are effectively lowering the drawbridge to anyone that can guess their Facebook password,” continues Russell. “As our personal and professional worlds continue to collide online, businesses that are serious about protecting their data need to rethink their approach to user authentication and drop usernames and passwords for good.”





Spotlight

Most popular Android apps open users to MITM attacks

Posted on 21 August 2014.  |  An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing MITM attacks, and occasionally additional ones, as well.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Aug 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //