Fastest Way to Access Most Sensitive & Critical Data, Hackers Say (Video)

Thycotic’s survey of attendees at the 2017 Black Hat Conference in Las Vegas reveals what cybersecurity technologies hackers think are obsolete; plus, the easiest and fastest ways they use to get at your sensitive data. Joseph Carson, CISSP, CSPO, CSP, Thycotic

Thycotic, a 2016 ‘ASTORS’ Homeland Security Award Winner for Best Cyber Excellence Solution, has released the findings from its 2017 Black Hat conducted survey of more than 250 hackers.

The survey was conducted in order to get a hacker’s perspective on what works and doesn’t work when it comes to protecting critical data.

ASTOR Gold AwardAccording to the survey:

  • Nearly one third (32%) of respondents state that accessing privileged accounts was the number one choice for the easiest and fastest way to get access to critical data
  • Followed closely by 27% indicating access to user email accounts was the easiest path to disclosing sensitive data

The focus on hacking privileged and email accounts reflects a recognition on the part of hackers that traditional perimeter security is no longer an effective barrier to getting inside networks and gaining access to critical data.

Findings from the survey indicate that 73% of hackers believe traditional security perimeter of firewalls and antivirus are irrelevant or obsolete.

“Given that privileged accounts are prime targets for hackers, IT professionals should consider the opinions of the hackers themselves when it comes to protecting privileged accounts,” said Joseph Carson, Chief Security Scientist, Thycotic.

2017 BLACK HAT HACKER SURVEY
2017 BLACK HAT
HACKER SURVEY

“In today’s connected world, organizations can no longer rely only on the traditional cybersecurity perimeter controls.”

“The new cybersecurity perimeter must incorporate an identity firewall built around employee and data using Identity and Access Management technology controls which emphasizes the protection of privileged account credentials and enhancing user passwords across the enterprise with multi-factor authentication.”

Additionally, 85% of respondents blame humans for security breaches, more so than the lack of security or unpatched software. 

“With traditional perimeter security technologies considered largely irrelevant, hackers are focusing more on gaining access to privileged accounts and email passwords by exploiting human vulnerabilities allowing the hacker to gain access abusing trusted identities,” noted Carson.

“More than ever, it is critical for businesses to mitigate these risks by implementing the right technologies and process to ward off unsuspecting attacks and access to sensitive data.”

Findings from the survey also concluded that: 

  • More than a third of respondents (35%) claim remembering and changing passwords is the top source of cybersecurity fatigue.
  • Hackers state that multi-factor authentication (38%) and encryption (32%) are their biggest obstacles.
  • Hackers view Threat Intelligence solutions as one of the least effective security protections, along with reputation feeds and education/awareness.

(Hear from Jonathan Cogley of Thycotic to Learn More on Enterprise-Level Password Management. Courtesy of Thycotic and Vimeo)

You may download the report and view the full survey results and findings from Thycotic’s 2017 Black Hat Survey, please visit http://bit.ly/2vC6U6n.

Thycotic logoThycotic secures privileged account access for more than 7,500 organizations worldwide, including Fortune 500 enterprises. 

Thycotic’s award winning Privilege Management Security solutions minimize privileged credential risk, limits user privileges and controls applications on endpoints and servers.