Why Access Management Is Security's Weak Link

By Samuel Greengard
  • Previous
    Why Access Management Is Security's Weak Link

    Why Access Management Is Security's Weak Link

    Weak and recycled passwords, along with the lack of a centralized password management policy and a credential management framework, place companies at risk.

Over the last decade, network access has become far more complex. A multitude of systems and devices—interconnected through mobility and clouds—has transformed the way data flows through the enterprise and to other organizations. Unfortunately, this has ratcheted up security risks. A study conducted by BeyondTrust, "IT Needs More Control Over Network Access Privileges," offers some perspective on the topic. The cyber-security firm surveyed more than 500 senior IT, IS, legal and compliance experts about privileged access management practices. Among the key findings: Weak and recycled passwords are common; many organizations lack a centralized password management policy; and many do not have a credential management framework in place. All of this puts many organizations at greater risk of a breach. Yet, remarkably, addressing the problem isn't overly complex. "This study confirms one of the unfortunate truths about data breaches today—namely, that many are preventable using relatively simple means," observed Kevin Hickey, president and CEO of BeyondTrust.

This article was originally published on 2016-10-05
Samuel Greengard writes about business and technology for Baseline, CIO Insight and other publications. His most recent book is The Internet of Things (MIT Press, 2015).
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.