• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Why you need to worry about credentials harvesting

by CXO Staff
March 17, 2019
in Opinions
Why you need to worry about credentials harvesting

The recent Intersec 2019 held in Dubai had an interesting participant: an American company selling padlocks of increasing size and weight, guaranteed to be unbreakable.

Today, threat actors are no longer intimidated by the size nor sophistication of the cyber security “padlock.” They are learning to bypass those indestructible padlocks and target the person carrying the master key to open them all. They are now looking for weak links – and in this case the weakest turns out to be the human element.

Traditionally the threat actor has been looked at as someone who breaks the veritable software code – the code hacker. In present day times, the hacker now looks for the software defect that even its originators overlooked when they built or modified the business application – known as the zero-day vulnerability.

Such threat actors who discover zero-day vulnerabilities and exploit them get their hefty investments either through the cyber-crime syndicates or are recruited by rogue nations targeting selected national infrastructures in target countries. But this is a long drawn out exercise, both in terms of time and effort, and is usually reserved for selected high-impact targets.

Threat actors therefore target user credentials and, if the end user happens to be a network or system administrator or other privileged account holder, then that is always the luckiest break for them. Threat actors of all types and their associates are working to gather privileged access credentials in an activity now termed as credential harvesting.

The 2018 Forrester Wave report for Privileged Identity Management points out that 80% of hacking-related breaches use either stolen, default, or weak credentials. If these credentials are from a network or systems administrator or other privileged users, those stolen credentials can provide access to the veritable crown data jewels of the kingdom, inside the network.

In short: hackers no longer “hack” in, they log in using compromised credentials.

Clearly all organisations need to have planned cyber security hygiene programs to increase the awareness of how threat actors are targeting employees to gain access to their corporate user name and privileged passwords and credentials.

Here are some of the activities that can be planned by organizations:

– Awareness of phishing

Users need to be shown the various types of phishing emails and other types of phishing tools like SMS and others. The more rigorous this training, the better for employee awareness and long-term stability.

– Protect, and double protect

Organisations needs to ensure all devices are registered on the network whether PCs, mobile, IoT, or any other connected devices. Administrators need to segregate the network based on corporate sensitivity and value of data and operations. This is called vaulting and the administrators area needs to have maximum security and protection. All sessions need to have automatic monitoring and auditing.

– Reduce attack surface

One of the most effective ways to harden the corporate environment is to optimize end user identities and remove any local instances of user name and passwords. Top-to-bottom hierarchical privileges, logical workflow access, and just in time privilege requirements are some of the best practices to implement.

– Multi-factor authentication

Using another authenticator besides a password to verify an identity or an exception login instance is one of the most effective ways to secure against credential hacking. Multi-factor authentication leverages information known to an end-user about what they know, what they are, and what they have.

A Ponemon study indicates that the average amount of time required to identify a data breach by the end user organization is 197 days, and the average amount of time needed to contain a data breach once it is identified is 69 days. That is a lot of time for a rogue actor to be floating inside a corporate network. Time for action!!

Tags: Centrifyfeatured4Security
ShareTweet

Related Posts

Why private cloud matters
Opinions

Why private cloud matters

As digital transformation accelerates across industries, private cloud has become a vital infrastructure model for organisations seeking the flexibility of...

June 9, 2025
Empowering the UAE’s digital future through data sovereignty
Opinions

Empowering the UAE’s digital future through data sovereignty

As the UAE continues to lead the charge in technological innovation, the importance of data sovereignty has never been more...

May 26, 2025

Discussion about this post

Latest Issue

Why private cloud matters

Why private cloud matters

June 9, 2025
Orange Maroc modernises its network with Ericsson

Orange Maroc modernises its network with Ericsson

June 9, 2025
Al Fanar Gas Group and Siemens Energy join forces

Al Fanar Gas Group and Siemens Energy join forces

June 9, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.