Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Insecure Password Storage Is One Of Eight IT Vulnerabilities

19/05/2014 by

W1siziisijiwmtqvmduvmtkvmtuvntyvmjkvmtuzl2lzb18ynzawmv9pbmzvcm1hdglvbl9zzwn1cml0ev9qyxmuanbnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

The Information Commissioner’s Office (ICO) has stated in a new report that companies failing to adequately protect their passwords is just one of eight information security vulnerabilities that modern firms face. The 47-page document recommends that passwords are processed via ‘salting’ or ‘hashing’ to ensure they are better protected, and that a security update policy is applied.

Talking about the options when developing company passwords, the ICO revealed that using a hash function provides a one-way method of changing any password into a hashed value. When passwords are first set up, the initial hash value is stored. On subsequent entries of the password, the hash is recalculated and compared to the initial value, allowing users to be authenticated if the hashes match. The benefit of this method is that even if hackers gain a list of the stored hashes, they cannot directly work out the passwords; however, the watchdog explained that once hackers have a hash value, there is nothing to stop them guessing the password. This is why the method of salting is then required.

“A ‘salt’…is a string of random data unique to each user,” the ICO explained. “The salt is used by combining it with the user’s password, then hashing the result. The salt is then generally stored alongside the hash in a database. When a user logs in to the service, the stored salt and the supplied password are freshly combined and hashed. As in the unsalted method, the new hash and the stored hash are compared to determine if the user should be authenticated.” The ICO added that although hackers could get a list of salts and hashes, having to crack both prolongs the time it takes them to break the passcodes, enabling companies to take action if they know they have become vulnerable.

In addition to highlighting the password issue, the the ICO’s report also outlined the need for companies to invest in well-designed security architecture. Included in its suggestions were the use of external-facing and internal-facing systems to provide increased data security; in addition, security updates should be made as quickly as possible and all firms should have a clear software update policy in place.

With many companies around the world fearing a cyber-attack, it is important to take stock of IT systems and ensure that precautions are in place. With many people’s passwords not sufficiently protected, this is an area that businesses must focus on.

Written by Montash.

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtyvmtivmdcvmtavmdyvndkvntg0l0vudgvychjpc2ugcmvzb3vyy2ugcgxhbm5pbmcgy29wes5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Infor launches new mobile solution

2016-12-07 09:00:00 +0000

Infor, one of the global leaders in enterprise resource planning (ERP) software, has revealed that it is launching a new mobile solution. The company, which has focused on developing specialised business applications for a variety of industries, unveiled Infor Mobility for Field Service (MFS). The solution is a comprehensive mobility application that can streamline operations for employees working in the field. To ensure that field technicians are provi...

W1siziisijiwmtyvmtivmdyvmdkvmjcvmtavnze4l2nsb3vkihrly2hub2xvz3kgc2vydmljzxmuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

AI continues to infiltrate cloud computing se...

2016-12-06 09:00:00 +0000

With Google and Microsoft both already working on artificial intelligence (AI) software for their cloud services, it has been revealed that Amazon is now to join the battle. The internet giant is to prioritise developing AI for Amazon Web Services (AWS), the division that sells data storage and computing to IT professionals around the world. AWS is currently the fastest-growing division for Amazon, with the past year having seen sales soar by 60 per cen...