dcsimg

Password Misuse Could Be Root Cause of Hacking Spike

  • Password Misuse Could Be Root Cause of Hacking Spike-

    Nearly half of all respondents (48 percent) indicated that privileged account passwords for a system device or application in their organization have remained unchanged for 90 days. It can therefore be surmised that nearly half of the respondents' organizations are unable to comply with IT regulatory mandates such as PCI-DSS, CAG, SOX, HIPAA, and others.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Password Misuse Could Be Root Cause of Hacking Spike

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Password Misuse Could Be Root Cause of Hacking Spike-6

    Nearly half of all respondents (48 percent) indicated that privileged account passwords for a system device or application in their organization have remained unchanged for 90 days. It can therefore be surmised that nearly half of the respondents' organizations are unable to comply with IT regulatory mandates such as PCI-DSS, CAG, SOX, HIPAA, and others.

In 2011, Lieberman Software surveyed more than 300 IT professionals for their insights into password practices and security outcomes. Portions of the survey focused on the numbers of passwords in use, sharing of privileged passwords, organizational security and other areas. The survey revealed that 48 percent of IT security professionals have worked for organizations whose network has been breached by a hacker. The results also paint a vivid picture of password chaos amongst IT staff and apathy about password security among senior management.

Survey respondents worked in organizations ranging from fewer than 100 to more than 10,000 employees, with the largest portion of respondents (62 percent) working in organizations that employ more than 10,000 individuals.

This slideshow summarizes survey results having to do with the attitudes and outlook of IT personnel.

More Slideshows:


Ten Tips for Getting the Most Out of Phone, Video and Web Conferencing Review best practices for conferencing with business contacts in different locations.

The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.

Top Five Recommendations for Mitigating the Effects of DDoS AttacksBest practices that companies can implement to reduce their risk.