{"id":18579,"date":"2018-08-09T14:16:44","date_gmt":"2018-08-09T18:16:44","guid":{"rendered":"https:\/\/www.jumpcloud.com\/?page_id=18579"},"modified":"2023-01-11T13:24:32","modified_gmt":"2023-01-11T18:24:32","slug":"why-its-time-to-take-identity-security-seriously","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/why-its-time-to-take-identity-security-seriously","title":{"rendered":"Why It\u2019s Time to Take Identity Security Seriously"},"content":{"rendered":"
Phishing, stolen identities, and weak passwords were the leading causes of data breaches in 20181<\/sup><\/a>, placing users and their credentials at the forefront of your network defenses. This reality hasn\u2019t caught up with most organizations, though. According to Gartner, companies were predicted to spend $96.3 billion on security in 2018. Yet, only $4.7 billion was supposed to go towards identity and access management, while the rest was supposed to go towards infrastructure protection, network security equipment, security services, and consumer security software2<\/sup><\/a>.\u00a0Spending more on segments like security services and infrastructure protection may have been adequate a decade ago, but today\u2019s prevalent cloud-forward IT environments call for an approach that takes identity security<\/a> more seriously. Those who have experienced a data breach would agree, with 68% of executives acknowledging that a larger investment in identity and access protection could have helped in preventing a breach3<\/sup><\/a>.<\/p>\n 191 accounts used by the average user<\/p>\n<\/li>\n 10% of those accounts are controlled by IT**<\/p>\n<\/li>\n 61% of users leverage same or similar passwords across all online resources*<\/p>\n<\/li>\n 123456 & password are the top 2 most popular passwords of 2018***<\/p>\n<\/li>\n 446 million records were exposed in 2018 alone.\u2020<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n With the amount of records exposed in 2018, that\u2019s enough to have affected the entire U.S. population and then some. This means that a majority of your employees have compromised credentials.\u00a0 To make matters worse, over half of your employees are using the same passwords across accounts, and those are supposed to guard access to your company\u2019s data. So, it\u2019s only a matter of time before a hacker finds one of your employee\u2019s reused passwords from the 1.4 billion available on the dark web7<\/sup><\/a>\u00a0and uses it to try to gain access to your digital assets. If you do have identity security in place, more than likely you are utilizing an antiquated solution that is putting you in a weak position to defend your digital kingdom. If you don\u2019t have any identity management solutions in place, you are open to a world of risk and expense.<\/p>\n So, why are 60% of execs who haven\u2019t experienced a breach still expecting to allocate most of their security budget to creating a strong perimeter even though the number one attack vector is identities3<\/sup><\/a>? Why are legacy identity management solutions no longer sufficient? The answer to both of these questions requires a deep dive into why it\u2019s time to take identity security seriously.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n Most would define identity security as the practice of ensuring that only the right people are accessing company resources; it also includes verifying users are who they say they are when they authenticate to a resource. Effective identity security usually involves having an identity and access management (IAM) solution in place that allows IT admins to centrally manage user identities and their access to IT resources. With an IAM solution, IT admins can enforce password complexity requirements, MFA, and securely provision\/de-provision access throughout the network\u2014components that are vital to any solid identity security strategy whether your network is in the clouds or on-prem.<\/p>\n\n\n\n Historically, identity security has been in the background of most security strategies, while the focus has been on fortifying the network perimeter. This worked okay in the past because resources only existed within the corporate network, behind firewalls, on-prem. This made it possible to keep them safely insulated from the \u2018world\u2019 (read: internet) , behind a heavily fortified perimeter. To access anything, employees would have to be physically inside the office and on its secure network, or gain access to it via VPN. Additionally, employees only needed a limited amount of IT resources to do their job, so there was a very limited number of touchpoints to keep track of.<\/p>\n\n\n Identity security also remained a silent partner for some time because it seemed to take care of itself. This was, in large part, due to the monopoly that Microsoft\u00ae<\/sup> had over the IT landscape. From Windows\u00ae<\/sup>systems and Microsoft Office\u00ae<\/sup> to Active Directory\u00ae<\/sup> and Windows Server\u00ae<\/sup>, it was difficult to get through a workday without using a tool from Microsoft. Buying into this setup, though, provided organizations with secure, centralized user and resource management. When someone on the internal network accessed an IT resource, IT would depend on Active Directory to ensure only the right people were obtaining access to valuable company data.<\/p>\n\n\n\n This on-prem, Microsoft-centric environment led IT organizations to believe that they could trust the internal network communication taking place in their environment, and so that\u2019s why they focused their efforts on protecting the network perimeter. This approach was commonly thought of as \u201chard on the outside, and soft on the inside\u201d. Kind of like M&Ms\u00ae<\/sup>, but there are digital assets at the center instead of chocolate.<\/p>\n\n\n\n However, the IT landscape has undergone a substantial transformation over the last two decades as technologies have \u2018lifted and shifted\u2019 themselves to the cloud as subscribed-for services. This traditional on-prem approach to identity management, therefore, would show its strain and demonstrate itself as a non-viable and potentially insecure solution moving forward.<\/p>\n\n\n\n First, many IT resources have moved to the cloud, and now most environments are utilizing web-based applications, cloud servers, cloud file storage solutions, and more. Second, the number of providers and platforms that organizations depend on has increased dramatically with the shift to the cloud. In turn, this has multiplied the number of touchpoints that IT and information security teams have to keep track of.<\/p>\n\n\n\n Fortunately, security methods have adapted accordingly in response to this explosion of diversity, and a new network security model was presented in 2009 that has redefined the relationship between IT organizations, users, and their data. It\u2019s called Zero Trust Architecture or Zero Trust Security, and this updated network security model has been widely adopted since it burst on the scene, blueprinting how system resources and digital assets can be fortified with security from the inside out. The idea is relatively simple\u2014by necessity, all network traffic and network users can\u2019t be trusted. When implemented correctly, cybercrime can then be spotlighted and eradicated before it ever grows out of control.<\/p>\n\n\n\n Zero Trust Security is predicated on three core concepts to help redesign security throughout a network8<\/sup><\/a>. Networks must be:<\/p>\n\n\n\n The last concept, central management for all networking elements, was further described as the \u201ckey to creating the network of the future.\u201d<\/strong>8<\/strong><\/sup><\/a> However, organizations have found it difficult to create a centralized management system for all of their networking elements, and subsequently, they have lost their control over identity security as well. So, why is this a challenge?<\/strong><\/p>\n\n\n\n The most ubiquitous directory service (Active Directory) was built to support on-prem, Microsoft-based IT resources, so IT admins have had to resort to a patchwork of independent vendors to assist with the secure management and \u2018binding\u2019 to Active Directory. These have included utilities to manage privileged user access to non-Microsoft servers; deploying SAML and other identity federation technologies to secure web based applications; specialized MDM solutions to control non-Windows systems; and more.<\/p>\n\n\n\n Sadly, these options have only ended up creating cumbersome workflows, introducing complex vendor relationships, and ultimately, increasing costs. Given this, it\u2019s understandable why a good number of organizations have been slow to pour more resources into identity security solutions like identity and access management.<\/p>\n\n\n\n Yet, continuing to remain complacent about identity security will only increase your chances of getting breached, and here\u2019s why: \u201cThe average company currently uses 1,083 cloud services in total.\u201d If that\u2019s not alarming, consider that only 108 of these are known services\u2014meaning 975 unknown services on average per company.9<\/sup><\/a><\/p>\n\n\n\n Further, the subscription-based, credit card model most applications leverage has made it too easy for entire departments of companies to bypass IT altogether to get the applications they want to use for their job. This has resulted in the proliferation of shadow IT where confidential streams of data exist outside of the walls of an IT organization\u2019s governance, and therefore, outside of IT admins control. In today\u2019s world, this is a nightmare for two reasons. One, company data is being accessed on upwards of 975 services that have little protection and oversight. Two, the little protection they do have is under the control of end users. What\u2019s wrong with this?<\/p>\n\n\n\n As a reminder from the introduction, 61% of users reuse passwords despite 91% knowing the security risks;4<\/sup><\/a> the top two passwords for 2018 were 123456 and Password.5<\/sup><\/a><\/p>\n\n\n\n Why do users have such a hard time with passwords? Well, a study from the Old Dominion University discovered a couple of things that may explain why users have trouble with this component to their credentials. The study found that,<\/p>\n\n\n\n “Users choose strong passwords only if they are willing to sacrifice convenience; it is not sufficient for them to simply understand it is important\u202610<\/a><\/sup>“<\/p>\n\n\n The study was also able to determine that users are<\/em> willing to sacrifice convenience for accounts, that if breached, would result in deep personal loss (e.g., bank accounts). For accounts like email, on the other hand, the study indicates that users have no interest in giving up convenience for security because when it comes down to it:<\/p>\n\n\n\n “Users are not concerned about security issues unless they feel they will be affected if the account is misused.10<\/a><\/sup>“<\/p>\n\n\n\n Ultimately, users engage in poor password habits because they think they won\u2019t be impacted by the consequences.<\/p>\n\n\n\n Another human factor that weakens security is a psychological phenomenon known as information cascade.11<\/sup><\/a> Information cascade is the name for when a person notices the decisions of one person and decides to make the same decisions, even if they know it\u2019s wrong. According to a study from the University of Basel in Switzerland, people are especially prone to copying the decisions of their supervisors.<\/p>\n\n\n\n 82%<\/strong> of participants agreed with the decision of their supervisor despite privately having a different opinion.12<\/sup><\/a><\/p>\n\n\n\n This means if a tenured employee stores their password on a sticky note that\u2019s attached to their monitor, other employees will notice and do the same, especially newer employees.<\/p>\n\n\n\n Lastly, users are still prone to falling for phishing scams, and hackers are not looking to let up on this type of attack any time soon. The The 2018 Verizon Data Breach Investigation Report found that phishing was in the top three for the kinds of attacks that resulted in a security incident\/breach.1<\/sup><\/a> One of the reasons users continue to fall for phishing attacks, despite security training, has to do with their curiosity. In fact, a study conducted at Friedrich-Alexander University, Germany, found the following with their participants:<\/p>\n\n\n\n When asked why they clicked on the link, the large majority of participants said that it was due to curiosity.13<\/sup><\/a><\/p>\n\n\n\n Sophisticated attacks are another reason why users continue to fall for phishing scams. Verizon\u2019s 2017 Data Breach Digest14<\/sup><\/a> presents an interesting example of one organization\u2019s experience with a phishing attack that ultimately led to fraudulent wire transfers:<\/p>\n\n\n “An accountant within the organization received an email from \u201ca customer claiming to have paid a late invoice. The email instructed the accountant to click a link and provide their email domain credentials to authenticate and review the payment receipt.\u201d<\/p>\n\n\n\n Once the attacker had gained these credentials, they used them to \u201clog into [the accountant\u2019s] email account and study [the organization\u2019s] wire transfer approval process by searching through emails. The threat actor even used previously sent invoices and tax forms to create fake versions that were used to\u2026fabricate an approval email chain that they sent to [the] Wire Transfers Department.\u201d Sadly, in this case the attackers ended up getting what they came for, and at the time of the Data Breach Digest being released, the organization was still working with law enforcement to recover their stolen funds.<\/p>\n\n\n\n So while a user\u2019s curiosity is certainly a weakness, it\u2019s important to realize that hackers also employ cunning tactics that make it increasingly difficult to spot a phishing email from a real one. <\/p>\n\n\n\n Even with threat actors\u2019 cleverness at play, these three factors illustrate who ends up guarding your company data when identity security isn\u2019t taken seriously: users who care more about convenience than the security of your company\u2019s data, who are too easily influenced by the behavior that\u2018s occurring around them, and who are up against clever hackers who exploit their curiosity. It\u2019s no wonder that users and their credentials were the largest attack vector in 2017\u2014they are easy pickings for hackers who understand how to leverage human psychology for their own selfish gain.<\/p>\n\n\n\n So, now that there is an understanding as to why it\u2019s time to take identity security seriously, it\u2019s time to transition into providing a few steps that your organization can take to accelerate your identity security strategy. Since the human element is at the center of whether or not identity security is a success, the solutions discussed below will help you counter users\u2019 curiosity and strong desire for convenience. After all, \u201cIn the big data era, insiders are exposed to increasing amounts of sensitive data, posing huge security challenges to organizations.\u201d15<\/sup><\/a> Hence, the focus is on taking steps that strengthen the weakest link, whoever that may be.<\/p>\n\n\n\n One way IT organizations can proactively address risk associated with user curiosity is by providing information security awareness training. When conducted in-depth, security awareness training has been shown to effectively teach users how to identify phishing techniques and improve their password and browsing habits. A 2010 study found that almost all of the participants involved with the study\u2019s security awareness training completed it with the \u201ccorrect idea about phishing and the dangers it poses both to the individual and to an organization.\u201d16<\/sup><\/a> <\/p>\n\n\n\n Additionally, the type of delivery method for security training was found to significantly impact users\u2019 understanding. A 2014 study on user preference for security training suggested that the best approach is to combine training methods and use them together to teach users about a specific cyber security topic. For example, the study focused on teaching users how to identify phishing attacks. They used a game-based training method to teach users what to look for in URLs in combination with text- and video-based training methods to cement their knowledge. The study found that users gain a more complete understanding from this multimodal approach, and almost all participants walked away with a correct idea about phishing.17<\/sup><\/a> In theory, once phishing is recognized in the wild, the jig is up for hackers so to speak, and the temptation to open a curious email can be sidestepped.<\/p>\n\n\n\n In addition to making sure employees understand email security, here are a few other recommended talking points that should be discussed in your quarterly security training:<\/p>\n\n\n\n While security training is a fantastic starting point to mitigate human curiosity, technology can be a powerful layer to add to your security strategy; one that often works well at preventing users from making choices based on convenience.<\/p>\n\n\n\n In order to greatly combat the human factor of convenience, implementing single sign-on (SSO) technology has been recommended.10<\/sup><\/a> This technology largely removes the temptation to repeat passwords for convenience. Thus, many security malpractices disappear.<\/p>\n\n\n However, not all SSO solutions are created equal. In fact, the term \u2018SSO\u2019 has become synonymous with web-based authentication using AD credentials because most SSO providers emerged as a means to connect Active Directory to the flood of web-based applications that had emerged in the early 2000s. But, as mentioned a few sections ago, web-based applications were only part of the changes that have taken place in the IT landscape. Modern IT environments are also leveraging cloud infrastructure hosted in AWS\u00ae<\/sup> or Google Cloud Platform\u2122 , wireless networks, Mac\u00ae<\/sup> and Linux\u00ae<\/sup> systems, and file storage solutions like on-prem Samba-based file servers and cloud solutions such as Box\u2122, Google Drive\u2122, and more. Active Directory still does not natively support many of these modern IT resources. Therefore, solely implementing a web app SSO provider isn\u2019t going to be enough for effective identity security because cloud infrastructure, Mac and Linux systems, and file storage will each require additional third-party add-ons or remain outside of IT\u2019s control. In other words, your IT environment will largely remain decentralized and rely upon the \u2018patchwork\u2019 of vendors to ensure you\u2019re covered.<\/p>\n\n\n\n Clearly, an effective identity security strategy doesn\u2019t benefit from an approach that utilizes AD and a string of third-party solutions. Instead, it needs a new kind of directory service altogether. One that joins the move to the cloud, embraces resources of all protocols, providers, and platforms, and securely connects users to their resources regardless of location. Such a solution would make it possible to centrally manage user authentication to all IT resources, giving IT full control and widespread visibility over their environment.<\/p>\n\n\n\n Fortunately, there is one solution on the market that is providing a more comprehensive approach to SSO. By JumpCloud\u00ae<\/sup>, the concept of True Single Sign-On\u2122 is delivered via the Directory-as-a-Service\u00ae<\/sup> platform. And, by implementing a True SSO solution for the enterprise as a whole, users no longer have to remember multiple passwords.<\/p>\n\n\n\n Leveraging True SSO with JumpCloud enables organizations to provide their end users with a single set of credentials to access virtually all of their IT resources, including systems, servers, applications, file storage, and networks. End users only have to remember one secure password instead of hundreds, providing users with a more convenient workflow. Additionally, this comprehensive approach to SSO provides IT admins with centralized control over user authentication and authorization. When used with JumpCloud\u2019s identity security features like MFA, Password Complexity Management, and SSH Key Authentication, IT is able to subtly guide users into making good identity security choices. For example, IT admins can ensure users are leveraging secure passwords and are rotating them on a regular basis. On top of that, IT can enable MFA across Mac and Linux systems as well as the JumpCloud admin and user console. This increases security around users accessing applications, tightens administrative access control, and bolsters Mac and Linux device security. Lastly, SSH authentication no longer has to be a hassle. Users can conveniently manage their public SSH keys without any intervention from IT\u2014improving efficiency and security.<\/p>\n\n\n\n While you can\u2019t stop hackers and bad actors from using phishing techniques to obtain your users\u2019 credentials, what you can do is start taking action now to ensure their efforts to steal digital assets are in vain. Dumping the majority of your security budget into fortifying the perimeter with anti-malware, firewalls, IDS, and \u201canomaly threat\u201d detection solutions has been shown to be a dated security strategy, and hackers are well aware that the weakest link lies within. As Zohar Steinberg, CEO of the security-driven payment company Token, once said:<\/p>\n\n\n\n \u201cAny piece of your personal information, when in malicious hands, can be considered serious. Often times, once hackers get a hold of certain pieces of personal information, they can use various techniques to get more, so even something as an email can seem harmless, but can eventually lead to other information being stolen from that first step.\u201d18<\/sup><\/a><\/p>\n\n\n\n Take it from the execs who have experienced a data breach and upgraded their identity security game: revamping your identity security approach is fundamental for avoiding data breaches and defending the long-term success of your enterprise.<\/p>\n\n\n\n It’s tough to count the amount of recent data breaches. If those aren’t enough to tell you why it’s time to take identity security seriously, read this.<\/p>\n","protected":false},"author":55,"featured_media":18581,"template":"","categories":[2337],"collection":[2775],"wheel_hubs":[],"platform":[],"resource_type":[2311],"funnel_stage":[],"coauthors":[2513],"acf":[],"yoast_head":"\nAfter all, consider this:<\/h4>\n
\n
First, What Exactly is Identity Security?<\/h2>\n\n\n
<\/figure><\/div>\n\n\n
Identity Security in the Past<\/h2>\n\n\n\n
<\/figure><\/div>\n\n\n
The Impact of Modern Technology on Security<\/h2>\n\n\n
<\/figure><\/div>\n\n\n
\n
Identity Security, Decentralized<\/h2>\n\n\n\n
In other words:<\/h4>\n\n\n\n
\n
The Human Factor<\/h2>\n\n\n\n
Human Factor 1: The Desire for Convenience <\/h3>\n\n\n\n
<\/figure><\/div>\n\n\n
Human Factor 2: The Effect of Information Cascade <\/h3>\n\n\n
<\/figure><\/div>\n\n\n
The study found that:<\/h4>\n\n\n\n
Human Factor 3: The Power of Curiosity<\/h3>\n\n\n
<\/figure><\/div>\n\n\n
\n
<\/figure><\/div>\n\n\n
Steps for Accelerating Identity Security<\/h2>\n\n\n\n
Combating Curiosity<\/h3>\n\n\n
<\/figure><\/div>\n\n\n
\n
Fighting Convenience with Convenience<\/h3>\n\n\n\n
<\/figure><\/div>\n\n\n
Securing Identities with True Single Sign-on\u2122<\/h2>\n\n\n\n
<\/figure>\n\n\n\n
Sources<\/h2>\n\n\n\n
\n