More reasons to use MCAS - Shadow IT accounts with weak passwords endanger organizations

%3CLINGO-SUB%20id%3D%22lingo-sub-1167549%22%20slang%3D%22en-US%22%3EMore%20reasons%20to%20use%20MCAS%20-%20Shadow%20IT%20accounts%20with%20weak%20passwords%20endanger%20organizations%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1167549%22%20slang%3D%22en-US%22%3E%3CP%3EI%20just%20saw%20the%20following%20article%20in%20one%20of%20my%20newsletters.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EHeise%20Security%2C%2010%20Feb%202020%3A%2063%25%20of%20enterprise%20professionals%20have%20created%20at%20least%20one%20account%20without%20their%20IT%20department%20being%20aware%20of%20it%2C%20and%20two-thirds%20of%20those%20have%20created%20two%20or%20more%2C%20the%20results%20of%20a%20recent%201Password%20survey%20have%20revealed.%20Even%20more%20worryingly%2C%20only%202.6%25%20of%20these%2063%25%20use%20a%20unique%20password%20when%20they%20create%20a%20new%20shadow%20IT%20account%20at%20work%20and%20just%2013%25%20use%20a%20password%20generator%20%E2%80%93%20the%20rest%20re-use%20a%20memorable%20password%20or%20use%20a%20pattern%20of%20similar%20passwords.%20%E2%80%9CSay%20Carlos%20%5Bin%20marketing%5D%20populates%20Airtable%20with%20customer%20data%20for%20his%20email%20campaigns%2C%20and%20Anita%20%5Bin%20legal%5D%20checks%20sensitive%20legal%20documents%20in%20Grammarly.%3CBR%20%2F%3EWithout%20thinking%20about%20it%2C%20they%E2%80%99re%20sharing%20a%20lot%20of%20important%20data%20with%20external%20companies%20that%20IT%20doesn%E2%80%99t%20even%20know%20about%2C%E2%80%9D%201Password%20CEO%20Jeff%20Shiner%20explained.%20%E2%80%9CIf%20one%20of%20these%20services%20suffers%20a%20breach%2C%20the%20company%20won%E2%80%99t%20know%20it%20affects%20them%2C%20which%20leaves%20them%20powerless%20to%20secure%20their%20data%20after%20the%20event.%20It%20also%20means%20they%E2%80%99ll%20be%20unable%20to%20disclose%20it%20to%20their%20customers.%20This%20could%20leave%20any%20company%20facing%20costly%20fines%20and%20a%20huge%20loss%20of%20trust%20in%20its%20operations.%E2%80%9D%20Former%20employees%20might%20retain%20access%20to%20their%20shadow%20IT%20accounts%20and%20their%20contents%20after%20they%20leave%20the%20organization.%20%E2%80%9CAt%20worst%2C%20this%20company%20data%20could%20be%20shared%20with%20a%20competitor%3B%20at%20best%2C%20it%E2%80%99s%20left%20dormant%20and%20hidden%2C%20but%20it%20still%20puts%20the%20company%20at%20risk%20if%20the%20service%20is%20breached%2C%E2%80%9D%20Shiner%20noted.%3CBR%20%2F%3EPromoting%20and%20encouraging%20the%20use%20of%20a%20password%20manager%20for%20creating%20strong%2C%20unique%20passwords%20for%20all%20accounts%2C%20storing%20them%20and%20sharing%20them%20securely%20can%20help%20with%20the%20unseen%20password%20problem.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1167549%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdvanced%20Security%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Respected Contributor

I just saw the following article in one of my newsletters.


Heise Security, 10 Feb 2020: 63% of enterprise professionals have created at least one account without their IT department being aware of it, and two-thirds of those have created two or more, the results of a recent 1Password survey have revealed. Even more worryingly, only 2.6% of these 63% use a unique password when they create a new shadow IT account at work and just 13% use a password generator – the rest re-use a memorable password or use a pattern of similar passwords. “Say Carlos [in marketing] populates Airtable with customer data for his email campaigns, and Anita [in legal] checks sensitive legal documents in Grammarly.
Without thinking about it, they’re sharing a lot of important data with external companies that IT doesn’t even know about,” 1Password CEO Jeff Shiner explained. “If one of these services suffers a breach, the company won’t know it affects them, which leaves them powerless to secure their data after the event. It also means they’ll be unable to disclose it to their customers. This could leave any company facing costly fines and a huge loss of trust in its operations.” Former employees might retain access to their shadow IT accounts and their contents after they leave the organization. “At worst, this company data could be shared with a competitor; at best, it’s left dormant and hidden, but it still puts the company at risk if the service is breached,” Shiner noted.
Promoting and encouraging the use of a password manager for creating strong, unique passwords for all accounts, storing them and sharing them securely can help with the unseen password problem.

0 Replies