Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

SSH keys are security Achilles Heel for most organisations

24/02/2014 by

W1siziisijiwmtqvmtavmjgvmtuvntavmjyvmjm3l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Most organisations have insufficient security controls against rogue, root-level access and cyber-attacks. That is the finding of a new study from the Ponemon Institute, “2014 SSH Security Vunerability Report: Information Technology’s Dirty Secret and Open Backdoors.”

The report was underwritten by Venafi, a leading cybersecurity company in Next-Generation Trust Protection applications.

How bad is the problem? Unprotected SSH (secure shell) cryptographic keys make nearly every enterprise server, virtual machine and cloud service vulnerable to cyberattacks, the report says.

Consider some study findings:

Three out of four enterprises have no security controls for SSH, which provides cyber attackers with root access
Over half of enterprises acknowledge that their organizations have already experienced an SSH-related compromise
Yet 46 percent of enterprises do not rotate or change SSH keys, in spite of the fact that SSH keys never expire, which means this represents a perpetual vulnerability
According to the report highlights, “cybercriminals are exploiting the lack of visibility and control over SSH keys used to authenticate administrators, servers and clouds.” In fact, 46 percent of the 1,854 IT professionals surveyed said their servers and networks are left open and can be owned forever by attackers because they fail to rotate SSH keys.

“Not surprisingly, 51 percent of organizations reported already being breached by an attack using SSH,” the study noted.

The bad news get worse, the report says, since this vulnerability has not gone unnoticed.

“The recently uncovered Mask operation steals SSH keys to impersonate, surveil, collect, and decrypt its target’s communications and data. If SSH keys are not replaced after intrusions like the Mask attacks, enterprise networks remain owned by the attackers,” the report said.

A majority of organizations would also have little way of knowing if they have been the victim of an attack initially. 60 percent of respondents said they could not detect rogue SSH keys on their network since their system administrators use manual processes to monitor and police SSH keys.

“Global organizations are under attack, and the attackers are more dangerous and persistent than ever,” the report said. “Armed with a litany of next-generation cybercrime tools, they’re vastly different from yester-year hackers and better enabled with targeted and persistent tools.”
www.fierceCIO.com, please click on this link to read the article in full http://www.fiercecio.com/story/ssh-keys-are-security-achilles-heel-most-organizations/2014-02-21#ixzz2uEC8KeSO

Montash is a multi-award winning , global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

For more information please contact us on +44 (0) 20 7014 0230 or alternatively send us an email on info@montash.com.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdyvmtmvmtavmjqvmjuvodcxl3nodxr0zxjzdg9ja181njewnja3mzmuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

How Great Leaders Cultivate Great Teams

2017-06-13 12:00:00 +0100

There's a difference between being a boss and being a leader. Leaders know how to inspire the best from their teams to achieve industry-leading results. For our latest blog, we spoke to our Managing Director, Roy Dungworth, to discover how businesses can create a culture that inspires great people to do great things together. Success in business doesn't begin and end with great leadership. Great leaders inspire their teams to want to do more and be bett...

W1siziisijiwmtcvmdyvmdgvmdgvndmvmdqvmzg5l3nodxr0zxjzdg9ja18zmdq1odc4nduuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

How are CIOs facing today's IT challenges?

2017-06-08 10:00:00 +0100

The IT landscape is facing some big changes. New legislation, increased cyber security threats and changes in user expectations have transformed the IT landscape significantly in the last five years. But how is the industry addressing this ever-evolving environment? In our latest blog, we spoke to Director of Information and Digital Services, James Maunder, to examine the state of the IT industry today and how organisations are responding to changes tha...