To Keep Your Network Secure, Use Multi-factor Authentication 100% of the Time
Curious how most cyber-criminal hackers gain access to enterprise networks? It’s simple: they steal or guess usernames and passwords.
In March, the American Bar Association (ABA) noticed unusual activity on its network, revealing the presence of an unauthorized hacker (reference). The hacker had gained access to the ABA network. In the process, they acquired usernames and passwords that members had used to gain access to a previous version of the ABA website.
Let’s look at what we can learn from the ABA attack.
While the older passwords were for a previous site, an investigation found that the usernames may still provide access to the current ABA Career Center and the current member system if members carried forward the same usernames and passwords..
The fallout of the attack caused the ABA to initiate its incident response plan and acquire outside cybersecurity experts to execute a full investigation.
The old ABA membership system used a technique called hashing and salting to encrypt the user passwords.
Hashing is a technique used in database management systems to search for the location of data without using an index structure. It makes it easy to determine whether or not two files in a computer system are the same. Data retrieval and processing can be done very quickly with hash tables.
Hashing is often used to store users’ passwords in an encrypted format so they are more secure.
To further protect data, a method called salting adds random data to the hash function for greater security.
Curious if your organization is missing out on a helpful new cybersecurity tool? Here are a few common uses of hashing:
While hashing is an innovative cybersecurity practice with wide-reaching applications, like many strategies, it is not a foolproof solution to safety. There are techniques where cybercriminals can manage to decode the encrypted passwords by brute force, particularly with access to a large number of them and when some of them have been left at their initial default values.
Cybercriminals are constantly learning and evolving. As with the ABA attack, hashing is not a sure protection. Organizations are advised to initiate multiple layers of security and robust incident response plans for when attacks inevitably occur. In the ABA cyberattack situation, it became necessary to have users that had carried forward their usernames and passwords from the old member system to create new ones. Furthermore, it was necessary to warn users to not use the same username and password on any other system, such as a banking or other financial website.
Whether you are looking to build your cybersecurity plan from ground zero or looking to add innovative measures to an existing framework, PK Tech can support your business and create a proactive security plan for the future. Get in touch with our team of experts here.
Curious how most cyber-criminal hackers gain access to enterprise networks? It’s simple: they steal or guess usernames and passwords.
As many cyber actors enter the cybersecurity landscape, ransomware hackers are constantly on the prowl for new ways to breach networks and gain...
Passwords are the keys to your personal and business fortresses. From personal emails to online banking and social media accounts, nearly every...