Most IT security pros think their organizations will suffer a data breach in next six months, says Lieberman Software
A survey conducted recently by Lieberman Software Corp. revealed that more than 70 percent of IT security professionals would not be willing to bet $100 of their own money that their companies will not suffer a data breach in the next six months.
The survey, which was carried out in February at the RSA Conference 2013, measured the attitudes of nearly 250 IT security professionals and the way their organizations manage cyber security. Nearly 50 percent of respondents work in organizations with more than 1,000 people.
The study also revealed that a third of organizations do not have a policy making it compulsory to change default passwords when deploying new hardware, applications and network appliances to the corporate network.
Commenting on the research, Philip Lieberman, president and CEO of Lieberman Software, said, "These figures highlight the fact that IT security professionals realize that most organizations are woefully unprotected against cyber attacks. While vendors of conventional security products -- like firewalls and anti-virus -- are constantly updating their tools to reactively protect against the latest threats, hackers are looking for flaws and engineering new attacks to exploit them. The reality is that 100 percent protection is nearly impossible to achieve, but there are still best practices for securing access to critical systems and data that many organizations tend to ignore.
"For example, this survey revealed the unfortunate fact that so many IT groups are still not changing default passwords when deploying new systems,” Lieberman added. “This should be a standard practice. Default privileged passwords are, in a sense, hidden backdoors onto systems that are deployed on a network. Most default passwords are publicly known and easily found online, meaning anyone with malicious intent can use these default credentials to gain anonymous access to systems and applications throughout the enterprise.
"IT departments that do not have a solution in place to automatically detect, flag and change default privileged passwords on newly deployed systems are neglecting a very common security hole," Lieberman said.
|Event Details||Dates of Event|
|SANS Counter Hack 2013||Nov 7 - 14|
|SANS Pen Test Hackfest 2013||Nov 7 - 14|
|SANS Korea 2013||Nov 11 - 16|
|Military Exports & Compliance Asia||Nov 12 - 14|
|NCT: Counter IED Asia, 12 - 15 November 2013, Bangkok||Nov 12 - 15|
|School Safety Symposium||Nov 13 - 13|
|Southwest Microwave Perimeter Defense Seminar||Nov 13 - 13|
|OWASP AppSec USA 2013||Nov 18 - 21|
|GovSec West Conference & Expo 2013||Nov 19 - 20|
|Southwest Microwave Perimeter Defense Seminar||Nov 19 - 19|
|Oracle 7th Annual Federal Forum||Nov 20 - 20|
|World BORDERPOL Congress||Dec 3 - 4|
|Critical Infrastructure Protection and Resilience Europe||Feb 12 - 13|