In present-day fast evolving electronic landscape, corporations facial area an increasingly intricate array of cybersecurity threats. The proliferation of cloud services and remote work preparations has heightened the vulnerability of digital identities to exploitation, earning it critical for firms to fortify their id security steps.
Our current analysis report, The Id Underground Report, provides valuable insights into the issues and vulnerabilities businesses experience in managing digital identities. The report paints a vivid photograph of the “concealed” id security liabilities the place attackers leverage Identification Danger Exposures (ITEs) such as forgotten user accounts and misconfigurations to breach organizations’ defenses, with each individual ITE posing a considerable danger to organizations’ security posture.
Discover the most widespread identification security gaps that direct to compromises in the to start with-ever risk report centered fully on the prevalence of id security gaps.
đź”— Get the Comprehensive Report
These results reveal alarming figures that underscore the prevalent prevalence of ITEs across corporations of all dimensions:
- 67% of corporations unknowingly expose their SaaS apps to possible compromise by insecure password synchronization techniques.
- 37% of admin end users nonetheless depend on weak authentication protocols like NTLM.
- 31% of user accounts are assistance accounts, which attackers seek out to focus on as security groups generally forget about them.
- A one misconfiguration in Active Directory spawns an common of 109 new shadow admins, enabling attackers to alter configurations and permissions, and get a lot more access to machines as they transfer deeper into an environment.
The shift to cloud-based environments introduces additional problems, as corporations synchronize on-prem user accounts with cloud Identification Vendors (IdPs). Although this streamlines obtain, it also makes a pathway for attackers to exploit ITEs in on-prem configurations to gain unauthorized access to cloud resources.
In the long run, it is vital to recognize the dynamic character of identity threats. Cybercriminals are frequently evolving their techniques, underscoring the require for a holistic and layered approach to security. By adopting proactive measures like Multi-Component Authentication (MFA) and investing in strong identity security solutions, organizations can boost their resilience against identity-relevant threats.
Understand far more about the underground weaknesses that expose corporations to id threats below and heed the report’s conclusions to prioritize security investments and eradicate your identity security blind places.
Found this write-up intriguing? This write-up is a contributed piece from just one of our valued partners. Follow us on Twitter ď‚™ and LinkedIn to examine much more exceptional material we submit.
Some parts of this article are sourced from:
thehackernews.com