Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

MEMBER
Heriadhi Waskitho
Quality Auditor
22
MEMBER
Desmond Tan
Manager, Service Management
159
EXECUTIVE MEMBER
Mezy Fadhila
HSSE Supervisor
80
MEMBER
Ben Oxford
Head of Digital Crisis Support Services
251

Industry Research : Survey Finds Password Misuse Root Cause of Hacking Spike

Lieberman Software Corporation, the providers of Privileged Identity ManagementSM (PIM) and  information security providers, today announced the result of their Password 2011 survey which revealed that 48 percent of IT security professionals surveyed have worked for organisations whose network has been breached by a hacker. The survey paints a vivid picture of password chaos amongst IT staff and apathy about password security amongst their senior management.

-51 percent of respondents had ten or more passwords to remember for use in their work

-42 percent of those surveyed said that in their organisations IT staff are sharing passwords or access to systems or applications

-26 percent said that they were aware of an IT staff member abusing a privileged login to illicitly access sensitive information

-48 percent of respondents work at companies that are still not changing their privileged passwords within 90 days – a violation of most major regulatory compliance mandates and one of the major reasons why hackers are still able to compromise the security of large organisations

Password Management and Data Breaches

The survey of more than 300 international IT professionals shows that a fundamental lack of IT security awareness in enterprises, particularly in the arena of password control and privileged logins, is potentially paving the way for a further wave of data breaches in 2011.

For many organisations these weaknesses are the backdoors by which hackers find their way into the enterprise’s most sensitive data. If almost 50% of all passwords remain unchanged, as this survey discovered, then fundamental and basic IT security practices are being ignored by staff and their senior management.

Privileged identities are accounts that hold elevated permission to access files, install and run programs, and change configuration settings. Their misuse is a major reason for data leakage.

Philip Lieberman, President and Chief Executive Officer of Lieberman Software said: "This survey shows that despite the huge number of frequent data breaches, over the past twelve months senior management in many organisations have not yet grasped the fundamentals of IT security. In fact they are actively paving the way for more and bigger disasters."

He continued: "Password anarchy among the IT staff at major organisations is mirrored by password apathy at the top of the management hierarchy, where senior management seem almost criminally lax in the enforcement of IT security policies - to the detriment of their organisations".

"These fundamentally careless practices and procedures revealed by the IT departments of the organisations we surveyed could cost them dearly in the coming months. We have consistently said that basic security includes locking down access to systems containing sensitive data to minimise the insider threat. However, only months after the Sony, RSA Security and Comodo hacks the situation within major organisations remains at risk," Lieberman said.

"Senior management will have to pay far more attention to their basic security practices or be forced to apologise to their shareholders and customers for major data losses and subsequent damage to brand loyalty. The simple, unpalatable truth is that senior management generally is not policing their IT security departments enough to avoid further massive data breaches."



Today's Tip of the Day - Double Standards

Read today's tip or listen to it on podcast.

More Editorial From Lieberman Software

Published: Friday, October 7, 2011

Printer Friendly Version Printer friendly version

2024 Buyers Guide Automated Call Distributors

 
1.) 
Premium Listing
Call Center Studio

Call Center Studio
Call Center Studio is the world’s first call center built on Google and is one of the most secure and stable systems with some of the industry’s best reporting. It is one of the most full-featured enterprise grade systems (with the most calling features, one of the best call distribution, outbound dialing features and integrations—including IVR, AI Speech Recognition, blended inbound/outbound calling and includes Google’s new Dialogflow and Speech API. Call Center Studio is the absolute easiest to use (with a 10 minute setup), and is the price performance leader with lower equipment cost and less setup time.

 

NEXTGEN-TV

NEXTGEN-TV PROGRAMMING

NOW PLAYING
Starting on the hour every hour today

A Refreshing Contact Center!
WATCH

Coming up this Week

About us - in 60 seconds!

Submit Event

Upcoming Events

The 19th World Final Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
 5897 

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =