Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Insecure Password Storage Is One Of Eight IT Vulnerabilities

19/05/2014 by

W1siziisijiwmtqvmduvmtkvmtuvntyvmjkvmtuzl2lzb18ynzawmv9pbmzvcm1hdglvbl9zzwn1cml0ev9qyxmuanbnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

The Information Commissioner’s Office (ICO) has stated in a new report that companies failing to adequately protect their passwords is just one of eight information security vulnerabilities that modern firms face. The 47-page document recommends that passwords are processed via ‘salting’ or ‘hashing’ to ensure they are better protected, and that a security update policy is applied.

Talking about the options when developing company passwords, the ICO revealed that using a hash function provides a one-way method of changing any password into a hashed value. When passwords are first set up, the initial hash value is stored. On subsequent entries of the password, the hash is recalculated and compared to the initial value, allowing users to be authenticated if the hashes match. The benefit of this method is that even if hackers gain a list of the stored hashes, they cannot directly work out the passwords; however, the watchdog explained that once hackers have a hash value, there is nothing to stop them guessing the password. This is why the method of salting is then required.

“A ‘salt’…is a string of random data unique to each user,” the ICO explained. “The salt is used by combining it with the user’s password, then hashing the result. The salt is then generally stored alongside the hash in a database. When a user logs in to the service, the stored salt and the supplied password are freshly combined and hashed. As in the unsalted method, the new hash and the stored hash are compared to determine if the user should be authenticated.” The ICO added that although hackers could get a list of salts and hashes, having to crack both prolongs the time it takes them to break the passcodes, enabling companies to take action if they know they have become vulnerable.

In addition to highlighting the password issue, the the ICO’s report also outlined the need for companies to invest in well-designed security architecture. Included in its suggestions were the use of external-facing and internal-facing systems to provide increased data security; in addition, security updates should be made as quickly as possible and all firms should have a clear software update policy in place.

With many companies around the world fearing a cyber-attack, it is important to take stock of IT systems and ensure that precautions are in place. With many people’s passwords not sufficiently protected, this is an area that businesses must focus on.

Written by Montash.

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmduvmdqvmtyvndavmzkvotg5l3nodxr0zxjzdg9ja181ndm0mduxmtuuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

7 Things About Your CV You Need To Fix Right ...

2017-05-04 18:00:00 +0100

As a global technology recruitment agency, we are in touch with candidates day in and day out. We've seen all kinds of CVs in our time and know a good one when we see it. As our recruitment team look to find the ideal candidate, they are looking for CVs that show how candidates can impact their clients in a positive way, not just look flashy on paper. You only have a small amount of space on your CV to show off your skills, so make every word count. Cut...

W1siziisijiwmtcvmdqvmjqvmtqvmzqvmzuvnjg3l3nodxr0zxjzdg9ja182mdq2otc5nziuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

What Does A Snap Election Mean For Recruitment?

2017-04-25 08:00:00 +0100

On Tuesday 18th April, Prime Minister Theresa May called a snap general election for 8th June, taking the nation by surprise. Rather than waiting until 2020, voters will now be casting their ballots in a matter of weeks. The hope for the government is that a Tory victory give the prime minister a strong mandate in parliament as Brexit negotiations begin. This sudden decision has been embraced by many in the recruitment industry due to the anticipated st...