These are the biggest security mistakes your business is making

Password Security
Bästa tjänsterna för lösenordshantering (Image credit: Shutterstock)

The US Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA) have revealed a worrying number of seemingly obvious cybersecurity rules aren't being followed by many business.

The organizations recently ran a red-and-blue-team exercise to identify the biggest security mistakes businesses are making these days, with the usage of default credentials in software, systems, and applications the number one mistake leading up to cyberattacks.

Many of the tools and services that businesses buy for their operations come with pre-installed login credentials. These factory settings are meant to be used only during initial setup and should be replaced with stronger, unique credentials, as soon as possible. However, many IT teams ignore this step, leaving their endpoints with credentials known to hackers and other threat actors. 


Reader Offer: $50 Amazon gift card with demo

Reader Offer: $50 Amazon gift card with demo
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Preferred partner (What does this mean?

Secure-by-design

Besides default login settings, other major mistakes include “improper separation of user and admin privileges” and “insufficient network monitoring”. In other words, IT teams often give low-level accounts admin privileges for no apparent reason, and when those accounts get compromised, it makes it almost impossible for IT teams to identify a malicious entity on their premises. 

"Through the analysis of topical and nested AD groups, a malicious actor can find a user account that has been granted account privileges that exceed their need-to-know or least-privilege function,” the advisory reads. "Extraneous access can lead to easy avenues for unauthorized access to data and resources and escalation of privileges in the targeted domain."

As for network monitoring, there are many ways in which organizations are dropping the ball here, including failing to properly set up various sensors to collect traffic and end-host logs, it was said. 

Furthermore, CISA and the NSA seem to be shifting part of the “blame” to the developers building out these products, pushing for the manufacturers to adopt secure-by-design and secure-by-default principles in the development cycle. 

"Ensuring software is secure by design will help keep every organization and every American more secure," CISA said in its announcement of the advisory. "We know that neither the government nor industry can solve this problem alone, we must work together. We continue to call on every software company to commit to secure-by-design principles and take that critical next step of publishing a roadmap that lays out their plan to create products that are secure by design 'out of the box'."

Via The Register

More from TechRadar Pro

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
password manager
I'm a security expert - here are my biggest tips for creating a secure password for work and home life to stay safe online
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
Frustrated unhappy laptop user girl touching head at work table with computer
Five essential tips for keeping your new PC secure
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
API
Businesses are being plagued by API security risks - with nearly 99% affected
Representational image of a hacker
The 10 worst software disasters of 2024: cyberattacks, malicious AI, and silent threats
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
The Witcher 4
You're probably not playing The Witcher 4 until 2027 at the earliest, per CD Projekt's latest financial update
DeepSeek
DeepSeek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora