Site icon IT World Canada

IT staff snoop on confidential user e-mails, study shows

COMMENT ON THIS ARTICLE

IT staff routinely snoop on users, riffling through their e-mails and personal files, a newly released survey has found.

One IT administrator laughingly said: “Why does it surprise you that so many of us snoop around your files, wouldn’t you, if you had secret access to anything you can get your hands on?” Why does it surprise you that so many of us snoop around your files? Wouldn’t you, if you had secret access to anything you can get your hands on?An IT administratorText

Few ordinary users realize that one in three of their IT work colleagues are snooping through company systems, peeking at confidential information such as your private files, wage data, personal e-mails, and HR background, using admin privileges.

These are the findings of a survey released today by digital vaulting specialist Cyber-Ark Software, which carried out the research at last month’s Infosecurity Exhibition as part of its annual survey into “Trust, Security and Passwords.”

What’s more, the survey found that more than one-third of IT professionals admit they could still access their company’s network once they’d left their current job, with no one to stop them.

More than 200 IT professionals participated in the survey with many revealing that although it wasn’t corporate policy to allow IT workers to access systems after termination, over one-quarter of respondents knew of another IT staff member who still had access to sensitive networks even though they’d left the company long ago.

Post-It Notes and passwords

More than half of people still keep their passwords on a Post-It note, in spite of all the education and reminders from the IT security industry to do it differently. Even IT pros do it too: more than half of respondents admitted to using Post-It notes to store passwords to administrator accounts.

One IT administrator said: “Sure, it’s easy for an employee to update the personal password to their laptop, but to change the administrator password on that same machine? It would take days for IT to do them all by hand. In the end, we just pick one password for all the systems and write it down.”

Administrative passwords

One-fifth of all organizations admitted that they rarely changed their administrative passwords with seven percent saying they never change administrative passwords.

This may explain why one-third of all people questioned would still have access to their network even if they’d left the company.

Eight percent of IT professionals said that the manufacturer’s default admin password on critical systems had never been changed. This remains the most common way for hackers to break into corporate networks.

Gary McKinnon, dubbed “the most profligate military hacker of all time” for gaining entry to 90 US military computer systems computers by scanning for blank administrator accounts, said: “The easiest way to infiltrate a company’s network is to look for administrative passwords which are left blank, still have the manufacturer’s default password or just use obvious names.

Once you find these, which are unbelievably simple and common to find, you’re into the system and have the highest level of authority — bingo you’ve got control of the company’s system.”

Password storage

The survey also showed that most companies mismanage the storage of administrative passwords by keeping them in unsecured locations and not controlling access to these critical codes.

Just over half (57 percent) of companies store their administrative passwords manually, 18 percent store them in an Excel spreadsheet, and 82 per ent of IT professionals store them in their heads — hindering security efforts, business continuity, as well as the auditing, controlling and managing of passwords.

In the event that the keeper of these critical administrative passwords is unavailable or loses the location of the passwords, it can cause massive disruption and hours of lost productivity. Insider sabotage

Fifteen percent of companies interviewed had experienced insider sabotage. According to a recent study by Carnegie Mellon University, the most common insider attack is by a disgruntled IT employee using anonymous access from a privileged account.

Calum Macleod, European Director for Cyber-Ark, said: it is surprising to find out how rife snooping is in the workplace.

“Gone are the days when you had to break into the filing cabinet in the personnel department to get at vital and highly confidential information. Now all you need to have is the administrative password and you can snoop around most places, and it appears that is exactly what’s happening.”

The Cyber-Arc exec said companies need to “wake up to the fact that if they don’t introduce layers of security, tighten up who has access to vital information, and manage and control privileged passwords, then snooping, sabotage and hacking will continue to be rife.”

COMMENT ON THIS ARTICLE

Exit mobile version