Passwords are Obsolete and Dangerous
Businesses today are in a cyber security crisis because passwords have become obsolete. The recent HBO data breach, in which hackers demanded a ransom…
August 17, 2017 at 07:40 PM
5 minute read
The original version of this story was published on Law.com
Businesses today are in a cyber security crisis because passwords have become obsolete. The recent HBO data breach, in which hackers demanded a ransom for internal emails along with a wealth of valuable network documents, is just the most recent event. There are red flags for businesses of all sizes – current protection methods just aren't cutting it. Most systems have the concept of an administrator who can access all information in the system, which means that one person's breach can bring the entire business down.
In fact, since August, nearly three quarters (73 percent) of all Americans have fallen victim to some type of cybercrime and 47 percent have had their personal information exposed by hackers. The cybersecurity “walls” that organizations have built around sensitive information are failing to stop breaches: 73 percent of hackers surveyed at the recent “Black Hat” convention believe traditional security perimeters of firewalls and antivirus are irrelevant or obsolete.
In the HBO data breach was preceded by cyber security attacks impacting millions of customers of Verizon, Yahoo and Dow Jones, the HBO case. Hackers are demanding a ransom for materials that include the draft scripts for upcoming episodes of the popular series Game of Thrones.
“Businesses are in a cyber security crisis, which directly impacts their viability,” said Randy Battat, CEO, PreVeil, who sat down with Inside Counsel in an exclusive interview. “IT managers and the C-suite may not realize that the likelihood of their server being compromised at some point is akin to death and taxes! It's increasingly obvious that current encryption methods aren't cutting it. For airtight protection, businesses should turn to end-to-end encryption, the 'gold standard' method, which protects user data even when the server is breached.”
PreVeil is turning these vulnerabilities on their head. It's in the beginning stages of helping enterprises protect their business communications with end-to-end encryption, the 'gold standard' method which protects user data even when the server is breached.
Today, the two most applied email encryption processes are encryption in transit and encryption at rest, both of which leave enterprise servers vulnerable, whether in the data center or the cloud, according to Battat. End-to-end encryption, in contrast, covers data on its journey from start to finish; messages and attachments are encrypted directly on the sender's device and are decrypted on the recipient's device. This means that only the sender and recipient can read them, but the server cannot, and anyone hacking the server sees just gibberish.
Then there is are passwords. He explained, “The credential-guessers who successfully breached HBO's email archive were relying on users' bad habits. In fact, most of the passwords used by individuals to access online accounts are the same or very similar for 39 percent of Americans. So, the hackers could rely on already-stolen login information to attempt to breach additional accounts.”
What's the lesson?
“Passwords are an inherently flawed way to protect important data stored in the cloud,” he said. “It's much more effective to rely on strong cryptographic keys stored locally on user devices, not easily guessed passwords, to facilitate user access to encrypted information in the cloud.”
It is not clear how the attackers got the data they released, but it may have had something to do with their administrative access to HBO's systems, per Battat. Hackers released screenshots showing some of HBO's administrative tools in use, which would suggest the fact that the hackers hijacked a super-user account with broad privileges. The size of the hack – which the attackers claim is 1.5 terabytes – and the access to unreleased TV shows also indicates a probable compromise of an administrator account in the HBO network.
According to Battat, first, a big red flag for businesses is password re-use as more than 80 percent of people in one study admitted using the same password for more than one service. Secondly, not encrypting sensitive data: Over nine percent of the seven billion records breached since 2014 were not encrypted. And finally, losing track of certificates and decryption keys as 54 percent of businesses don't know the location, ownership or use of their encryption keys and certificates.
“Passwords are an annoyance for users, who hate remembering, updating, and entering passwords. Bogus theories about password strength have created a perfect storm, whereby people often use passwords that are hard for them to remember, but easy for computers to guess,” he explained. “They're vulnerable to attack because hackers correctly assume people will re-use them between accounts.”
So, what is going to replace passwords?
One very promising replacement for passwords will be cryptographic keys stored in user devices, such as those used in PreVeil, according to Battat. Using them eliminates the need for users to remember and enter passwords. In addition, they provide strong protection because they're not easily guessable, they cannot be stolen from one service and used for another, and because they're not stored on servers which can be vulnerable to attack.
“End-to-end encrypting data is a critical step companies need to take,” he said. '45 percent of information technology personnel knowingly circumvent their own security policies, so it is no wonder that many normal employees do the same and do not practice good cybersecurity habits.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllSEC Penalizes Wells Fargo, LPL Financial $900,000 Each for Inaccurate Trading Data
US Reviewer of Foreign Transactions Sees More Political, Policy Influence, Say Observers
Pre-Internet High Court Ruling Hobbling Efforts to Keep Tech Giants from Using Below-Cost Pricing to Bury Rivals
6 minute readPreparing for 2025: Anticipated Policy Changes Affecting U.S. Businesses Under the Trump Administration
Trending Stories
- 1Pa. Hospital Agrees to $16M Settlement Following High Schooler's Improper Discharge
- 2Connecticut Movers: Year-End Promotions, Hires and an Office Opening
- 3Luigi Mangione Defense Attorney Says NYC Mayor’s Comments on Case Raise Fair Trial Concerns
- 4Revisiting the Boundaries Between Proper and Improper Argument: 10 Years Later
- 5Hochul Vetoes 'Grieving Families' Bill, Faulting a Lack of Changes to Suit Her Concerns
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250