These are the biggest security mistakes your business is making

You’re keeping factory settings, aren’t you?

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

The US Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA) haverevealeda worrying number of seemingly obvious cybersecurity rules aren’t being followed by many business.

The organizations recently ran a red-and-blue-team exercise to identify the biggest security mistakes businesses are making these days, with the usage of default credentials in software, systems, and applications the number one mistake leading up to cyberattacks.

Many of the tools and services that businesses buy for their operations come with pre-installed login credentials. These factory settings are meant to be used only during initial setup and should be replaced with stronger, unique credentials, as soon as possible. However, many IT teams ignore this step, leaving theirendpointswith credentials known to hackers and other threat actors.

Reader Offer: $50 Amazon gift card with demoPerimeter 81’s Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Preferred partner (What does this mean?)

Secure-by-design

Secure-by-design

Besides default login settings, other major mistakes include “improper separation of user and admin privileges” and “insufficient network monitoring”. In other words, IT teams often give low-level accounts admin privileges for no apparent reason, and when those accounts get compromised, it makes it almost impossible for IT teams to identify amaliciousentity on their premises.

“Through the analysis of topical and nested AD groups, a malicious actor can find a user account that has been granted account privileges that exceed their need-to-know or least-privilege function,” the advisory reads. “Extraneous access can lead to easy avenues for unauthorized access to data and resources and escalation of privileges in the targeted domain.”

As for network monitoring, there are many ways in which organizations are dropping the ball here, including failing to properly set up various sensors to collect traffic and end-host logs, it was said.

Furthermore, CISA and the NSA seem to be shifting part of the “blame” to the developers building out these products, pushing for the manufacturers to adopt secure-by-design and secure-by-default principles in the development cycle.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

“Ensuring software is secure by design will help keep every organization and every American more secure,” CISA said in its announcement of the advisory. “We know that neither the government nor industry can solve this problem alone, we must work together. We continue to call on every software company to commit to secure-by-design principles and take that critical next step of publishing a roadmap that lays out their plan to create products that are secure by design ‘out of the box’.”

ViaThe Register

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

This new phishing strategy utilizes GitHub comments to distribute malware

Should your VPN always be on?

Samsung plans record-breaking 400-layer NAND chip that could be key to breaking 200TB barrier for ultra large capacity AI hyperscaler SSDs