With so many different types of cyberattacks being launched against companies these days, a common question among businesses looking to improve their defenses is “Where should we focus our efforts?” The US Cybersecurity and Infrastructure Security Agency (CISA) is helping to answer that question. It is developing a catalog of “Bad Practices” — practices that are exceptionally risky.
Launched in late August 2021, the catalog currently lists the following bad practices. The agency plans add to the list based on input from the IT security community.
1. Using Unsupported Software
Using software that is not supported by its vendor is very risky. The risk is further compounded if the unsupported software (or the technology in which it is incorporated) is accessible from the Internet.
Unsupported software includes applications that have reached the end of their lifecycles. Once apps reach a certain age, vendors stop providing updates for them. Not receiving updates that fix functionality glitches or add features is merely inconvenient. However, not receiving updates that patch newly discovered security vulnerabilities is dangerous. That’s because cybercriminals often exploit software vulnerabilities to access companies’ networks. In 2020, vulnerability exploitation was the initial attack vector in nearly a third of the cyberattacks investigated by security analysts.
To minimize the risk of getting attacked, companies should use software that is supported by the vendor. Equally important, they need to apply software updates in a timely fashion.
2. Using Default Credentials for Service Accounts
Cybercriminals like to hack the service accounts for software and hardware because they can easily elevate the accounts’ privileges and gain access to sensitive data. Few vendors, though, design their software or hardware to create a unique default service-account password when the software or hardware is installed by a customer. Instead, the same default password (e.g., “admin”, “password”, “guest”) is used for every installation.
Although vendors typically recommend that customers change the default password before using the software or hardware in their operations, many companies fail to do so. These businesses are at much greater risk of being successfully attacked because hackers keep track of default service-account passwords and incorporate them into brute-force password-cracking tools. These tools are commonly used to infiltrate companies’ networks. In 2020, brute-force attacks were the most widely used initial attack vector.
To mitigate the threat of brute-force attacks against service accounts, companies need to make sure that they have changed the default passwords for those accounts. The passwords chosen must be both strong and unique. Multi-factor authentication should also be set up for those accounts.
3. Using Single-Factor Authentication for Remote or Administrative Access
Using single-factor authentication (e.g., password-based authentication) for remote or administrative access to IT systems is highly risky, especially if the authentication system is accessible from the Internet. The risk is due to the fact that cybercriminals often use compromised passwords in their cyberattacks. For example, in 61% of data breaches, cybercriminals used compromised credentials to hack into the companies’ networks, according to Verizon’s “2021 Data Breach Investigations Report“.
Cybercriminals can obtain compromised passwords several ways. For instance, they might use a phishing scam to trick an employee into revealing a password or they might buy compromised credentials on the dark web.
A more secure, less risky strategy is to use multi-factor authentication for remote and administrative access to IT systems. With two-step authentication, a second credential (e.g., a one-time security code) is needed to log in. That way, even if hackers have the compromised credentials for an IT system, they won’t be able to access it.
For more information on how to reduce security risks, please contact us.
Top 9 Reasons to Move Your Business to the Cloud
Here are the top reasons to move your business to the Cloud…or at least consider it! 9. It will make your life easier- access your information…
5 Technology Trends That Will Influence Businesses in 2019
The march of technology never stops in the world of business, and no matter what vertical or industry you work in, you need to be…
Microsoft Teams: for Communications and Collaborations That Know No Bounds
The COVID-19 pandemic has abruptly altered our personal and professional lives. Flattening the curve means workplaces, schools and our favorite restaurants are closed. Fortunately, for…
Device-as-a-Service vs Leasing
The as-a-Service subscription model is quite pervasive today. We subscribe to services such as Netflix or Spotify as consumers and Software-as-a-Service for businesses has been…
To Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer
Most people never heard of the Colonial Pipeline Company before May 2021, even though it transports 45% of all fuel consumed on the US East…