Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Insecure Password Storage Is One Of Eight IT Vulnerabilities

19/05/2014 by

W1siziisijiwmtqvmduvmtkvmtuvntyvmjkvmtuzl2lzb18ynzawmv9pbmzvcm1hdglvbl9zzwn1cml0ev9qyxmuanbnil0swyjwiiwidgh1bwiilci2mdb4ndawxhuwmdnlil1d

The Information Commissioner’s Office (ICO) has stated in a new report that companies failing to adequately protect their passwords is just one of eight information security vulnerabilities that modern firms face. The 47-page document recommends that passwords are processed via ‘salting’ or ‘hashing’ to ensure they are better protected, and that a security update policy is applied.

Talking about the options when developing company passwords, the ICO revealed that using a hash function provides a one-way method of changing any password into a hashed value. When passwords are first set up, the initial hash value is stored. On subsequent entries of the password, the hash is recalculated and compared to the initial value, allowing users to be authenticated if the hashes match. The benefit of this method is that even if hackers gain a list of the stored hashes, they cannot directly work out the passwords; however, the watchdog explained that once hackers have a hash value, there is nothing to stop them guessing the password. This is why the method of salting is then required.

“A ‘salt’…is a string of random data unique to each user,” the ICO explained. “The salt is used by combining it with the user’s password, then hashing the result. The salt is then generally stored alongside the hash in a database. When a user logs in to the service, the stored salt and the supplied password are freshly combined and hashed. As in the unsalted method, the new hash and the stored hash are compared to determine if the user should be authenticated.” The ICO added that although hackers could get a list of salts and hashes, having to crack both prolongs the time it takes them to break the passcodes, enabling companies to take action if they know they have become vulnerable.

In addition to highlighting the password issue, the the ICO’s report also outlined the need for companies to invest in well-designed security architecture. Included in its suggestions were the use of external-facing and internal-facing systems to provide increased data security; in addition, security updates should be made as quickly as possible and all firms should have a clear software update policy in place.

With many companies around the world fearing a cyber-attack, it is important to take stock of IT systems and ensure that precautions are in place. With many people’s passwords not sufficiently protected, this is an area that businesses must focus on.

Written by Montash.

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...