BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

How the Single Most Important IT Security Recommendation Helps Solve a Thousand-Year-Old Problem

April 5, 2019

  • Blog
  • Archive

In the world of cybersecurity, we’re exposed to an onslaught of recommendations and top “n” lists for improving IT security. The impetus for these recommendations may be the emergence of modern threats, breaches in the news, or to convey detailed analysis of various dangerous attack vectors. While such articles and blogs play a crucial part in helping to educate both the IT community and non-IT workers alike, these posts are commonly narrow in focus. They may have some universal characteristics, but are infrequently not relevant for adoption by everyone, everywhere, and at every time. This is where this blog steps in.

What is the number one, universal, and best security recommendation for everyone to embrace? I will give you a hint, it is related to passwords.

To further set the stage for this recommendation, let’s consider all the infosec recommendations we experience on a daily basis. These include everything from security skills and cyber awareness training to patch management. They target problems from phishing to vulnerability management, but are not necessarily relevant to every employee within an organization, nor are they necessarily relevant to each person on their personal devices at home. For example, a default Windows 10 device or MacOS Mojave device will automatically patch security vulnerabilities and reboot, if necessary, keeping the problem out of sight and out of mind for the average user. In addition, recommendations for cybersecurity training are generally tailored for a specific kind of organization and not necessarily applicable across different verticals due to a number of variables.

While it is common knowledge to avoid email spam, and employees are often trained on how to identify suspicious emails and advised not to click on suspicious links, it is interesting that younger generations are far less likely to embrace email outside of the corporate enterprise. Instant messaging and other forms of social media are their tools of choice, which suggests that traditional email may slowly fade away like postal correspondence, or the fax machine. The demise of email may take a few more decades to transpire, but this downshift is well underway.

All of this helps further refine our single best recommendation. Remember, we need to consider a universal security recommendation that translates to everyone.

Fixing a Thousand-Year-Old Security Issue

Regardless of persona at home or at work, the one thing everyone uses are passwords. We use passwords for work, for resources on the Internet, for social media, for our applications. We use them in the form of passcodes and PINs for banking, mobile devices, and for office and home alarm systems. Passwords are ubiquitous, and we use them constantly—even on newer systems that ironically claim to be “password-less.” In these instances, a mechanism under the hood is still identifying your access rights and storing that “somehow”.

Passwords date back at least to the era of the Roman military. Passwords were once carved into wood and passed around by soldiers via the active guard on duty. In essence, passwords were a shared resource-- which we (should) recognize is a liability, since multiple people would have knowledge of the passwords at any given time.

Today, the most common storage of any password is within a single human brain. We assign a password to a system or application, recall it when it needs to be used, and hopefully remember it each time we change it. Our brains are full of passwords, and often, we forget them, reuse them, need to share them, and are forced to document them on post-it notes, spreadsheets, and even communicate them via email or SMS text messages (a very poor security practice!).

These insecure methods for creating, sharing, and reusing passwords are responsible for the types of data breaches that routinely make the front page news, serving as cautionary tales of what is at high-risk of happening when good password management strategies are not adhered too. The ramifications crisscross both our professional and personal lives.

Passwords are everywhere, and we need at least one basic tenant to help fix a thousand-year old problem. Therefore, the most important security recommendation for everyone is:

Ensure that every password you use is unique and not shared with any other resource (including people) at any other time.

While we recognize that remembering an already considerable and ever-expanding list of passwords (an average of 120 for the modern day corporate user) is improbable for most humans, there are password management tools, solutions, and techniques for making this a reality, thereby going a long way toward reducing password-related threats.

Modern operating systems, browsers, and applications can help create unique passwords for every resource, and securely store them for retrieval in lieu of a human having to remember every single one. The passwords are basically stored behind one unique “master” password (it may also be referred to as a "key" or "secret") that only the individual knows. While this is good solution for home and small business users (to a limited degree), it does not scale to most businesses that need to share accounts (due to technology limitations) and automatically generate unique passwords, such as to keep up with employee changes or to meet regulatory compliance guidelines.

Another security best practice to be mindful of—a password alone should never be the only authentication mechanism for critical data, sensitive systems, and potentially daily operations into those resources. Multi-factor authentication (MFA) or two-factor authentication (2FA) should be layered on top to ensure a unique password per account is actually being used by the correct identity when authentication is required.

One key merit of this universal security recommendation is that it ensures that if your password is stolen, leaked, or inappropriately used, it can only be leveraged against the corresponding resource assigned (if MFA or 2FA is not present). If passwords are unique, a threat actor cannot use one compromised account and password to attack other resources. The attackers options and movement are significantly limited, though they could try to leverage advanced techniques to steal other credentials from the system they have compromised, such as by scraping passwords from memory. In that case, not only generating unique passwords, but also rotating passwords frequently will help mitigate the attack. This is where BeyondTrust can provide an end-to-end solution for you.

BeyondTrust’s Password Safe is a solution for privileged password management across an organization’s entire information and security infrastructure. Password Safe provides automated management for sensitive accounts and passwords (including SSH key management), such as shared administrative accounts, application accounts, local administrative accounts, and service accounts, across nearly all IP-enabled devices. This helps ensure this top security recommendation can be implemented across any organization to enforce strong enterprise password security.

Furthermore, request, approval, session monitoring and management, and retrieval workflow functionality is included for end-user access of managed privileged accounts. This helps control when passwords are used and, most importantly, how they are used.

For more information on this number one recommendation and BeyondTrust Password Safe, please contact us here. We are ready and able to enhance your organization’s cybersecurity posture.

Related Resources

Privileged Password Management Explained (white paper)

Password Safe (datasheet)

The Little Password That Could: How a Reused Password Could Vaporize Your Enterprise (webcast)

Modernizing Your Privileged Password Security (blog)

Secrets Management Overview & 7 Best Practices (blog)

What is Privilege Management and Where Do You Start? (white paper)

Photograph of Morey J. Haber

Morey J. Haber, Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

Whitepapers

The Operational Technology (OT) Remote Access Challenge

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.