Menu
Cybersecurity needs a rethink in 2016: Centrify

Cybersecurity needs a rethink in 2016: Centrify

Compromised user credentials the cause of most breaches in 2015

Centrify country manager A/NZ, Lachlan Mckenzie

Centrify country manager A/NZ, Lachlan Mckenzie

Identity management company, Centrify, has warned A/NZ organisations that compromised user credentials are the new normal.

The company claimed organisations need to mitigate against risk created by compromised credentials rather than hoping such events don’t occur.

Centrify A/NZ country manager, Lachlan McKenzie, said in 2015, breaches globally included high profile criminal and state-sponsored attacks.

“Breaches involved millions of personnel records of government employees, tens of millions of records of insurance customers, and hundreds of millions of customer records from various other companies,” he said.

“This year we even heard of a billion-dollar bank heist! Many of these companies had implemented advanced malware protection, next generation firewalls and delivered regular security training sessions for their employees. Yet the breaches continue.

“Australia and New Zealand are not protected from these sort of assaults by our remote locations in the world. In fact, we are more at risk than ever before because of our increasingly online economies.”

McKenzie said cybersecurity experts such as Verizon and Mandiant had reported that the majority of today’s data breaches were due to a single vulnerability - compromised user credentials. “It all comes down to the humble username and password,” he said.

“Through phishing, Trojans and APTs, hackers today are focused on obtaining the digital keys to the kingdom so they can use them to access sensitive data and systems.

“To reduce this risk, organisations in 2016 must adopt measures to mitigate the threat posed by compromised credentials. While complex or unique passwords are a start, they will never be enough.

“Businesses and government agencies need to implement multi-factor authentication (MFA) more broadly and across more apps and devices in order to defend against such attacks. Adaptive access can detect and stop suspicious login attempts while adopting granular privilege management can reduce the impact of compromised credentials.

“For 2016, companies need to accept that compromised credentials are the ‘new normal’ and then take steps to mitigate the risks they present,” he added.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags Ce4ntrifyAPTcybersecurityidentity managementverizonmulti factor authenticationMandiant

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments