Page 67 - Cyber Defense eMagazine for September 2020
P. 67

These  findings  are  key to  understanding  the  mechanics  of  a  data  breach.  Attackers  find  weak  links
            through vulnerable frontline workloads and execute lateral movement, to progressively move through the
            network and find more sensitive assets. According to our research, nearly 81 percent of organizations
            had at least one neglected, internet facing workload.


            Tip:  Assume  breaches  will  happen  and  look  for  lateral  movement  risks. Attackers  will  use  secrets,
            credentials and keys stored on breached servers to move laterally. Don’t wait for them to find these attack
            opportunities – search for these risks beforehand to remove or tighten, as applicable.



            Poor Password Security Creates Authentication Issues

            Companies must also pay close attention to the authentication and verification methods used to grant
            permission to frontline and internal workloads. Today, there is no excuse for organizations that do not
            implement basic authentication protocols like multi-factor authentication (MFA).

            Sadly, this is not the case, as we found that 23 percent of organizations have at least one cloud account
            that does not use multi-factor authentication for the root account (super admin user).

            Weak passwords and credentials also remain an issue for organizations to ensure the security of their
            public cloud environments. More than 5 percent of organizations have at least one workload using an
            easy-to-guess or leaked password, which is either a simple derivative of an existing password or has
            been detected in a previous breach.











































            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         67
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   62   63   64   65   66   67   68   69   70   71   72