SHARE
Facebook X Pinterest WhatsApp

Privileged Account Security Still Vulnerable Despite Security Increases

5 Components of an Enterprise Print Security Strategy In theory, creating privileged access accounts to the most critical areas of your company’s network is supposed to add a layer of security to sensitive data or infrastructure. However, these accounts are difficult to completely lock down and thus could be a data vulnerability for many enterprises, […]

Written By
SP
Sue Poremba
Aug 17, 2015
Slide Show

5 Components of an Enterprise Print Security Strategy

In theory, creating privileged access accounts to the most critical areas of your company’s network is supposed to add a layer of security to sensitive data or infrastructure. However, these accounts are difficult to completely lock down and thus could be a data vulnerability for many enterprises, says TechTarget’s SearchSecurity:

In the wrong hands, privileged accounts represent the biggest threat to enterprises because these accounts can breach personal data, complete unauthorized transactions, cause denial-of-service attacks, and hide activity by deleting audit data. Privileged accounts, such as the UNIX root, Windows Administrator accounts or accounts associated with database ownership and router access, are required for platforms to function. Moreover, they are required for ‘break the glass’ emergency access scenarios as well as more mundane day-to-day tasks.

A survey conducted by Thycotic of 201 hackers at Black Hat USA 2015 found most agreed that privileged accounts aren’t as secure as we think they are, and that little has been done to improve on such account security in recent years. According to the survey, despite an increase in security spending, 75 percent of hackers haven’t seen any real change in the level of difficulty in compromising privileged account credentials. In fact, the vast majority said it may be even easier to hack into these accounts than it was just a couple of years ago.

So just how easy is it to attack privileged accounts? Nearly half of those surveyed said it was a favorite target when wanting to get direct access to large amounts of critical data. Why is it such a favorite entry point for hackers? Because it is easy prey—companies are doing very little to protect themselves or their data through these accounts as a whopping 94 percent of those questioned said they often find privileged credentials in unprotected files.

Nathan Wenzler, senior technology evangelist at Thycotic, said in a release:

It is apparent that for all the new defensive solutions that have been introduced, we still haven’t cracked the code on how best to protect mission-critical data and company secrets, and in fact, in some cases we’re only adding additional layers of complexity which provide attackers more attack vectors to use to break in. It’s also clear from the data that even some of the most basic security practices are still not being enforced well enough by organizations and privileged login credentials are constantly left vulnerable to intruders.

If you want a solid example of why you may want to rethink the security surrounding privileged access accounts, it can be found in perhaps the largest (in terms of data compromised, at least) cyberattack in the country: the Office of Personnel Management attack. But it is also a problem we’re seeing over and over again with other breaches. As the Christian Science Monitor stated, we’re seeing this type of attack being used more frequently, and the reason is becoming clear: The attackers gain a foothold into the system because they appear to be there legitimately.

If you haven’t done so in a while, it may be time to rethink the security around your privileged accounts. How easy would it be for someone to slip into your critical infrastructure without being caught?

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.