{"id":11755,"date":"2014-11-05T11:09:14","date_gmt":"2014-11-05T11:09:14","guid":{"rendered":"http:\/\/www.cloudcomputing-news.net\/news\/2014\/nov\/05\/salesforce-customers-learn-code-spaces-swift-demise\/"},"modified":"2014-11-05T11:09:14","modified_gmt":"2014-11-05T11:09:14","slug":"salesforce-customers-learn-from-code-spaces-swift-demise","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/salesforce-customers-learn-from-code-spaces-swift-demise\/","title":{"rendered":"Salesforce customers: Learn from Code Spaces\u2019 swift demise"},"content":{"rendered":"<p><em>Picture credit: iStockPhoto<\/em><\/p>\n<p>A benchmark report by Adallom into the uptake of software as a service (SaaS) applications has found that Salesforce customers have the highest percentage of privileged access users &ndash; and warned about the problems that may cause businesses.<\/p>\n<p>On average 7% of users on Salesforce accounts are privileged or have admin access, compared with 4% for Google Apps, 2% for Box and 1% for Office 365, the other three services analysed.<\/p>\n<p>The report gave a grave warning over the prevalence of &ldquo;super admin&rdquo; accounts &ndash; ones with complete and unrestricted access to the SaaS. &ldquo;A compromised &ldquo;super admin&rdquo; account represents a much greater threat to an organisation because it has access not only to view and edit privileged data, but also to modify access rights of other privileged users,&rdquo; the report notes.<\/p>\n<p>Regular readers of <em>CloudTech<\/em> will remember <a href=\"http:\/\/www.cloudcomputing-news.net\/news\/2014\/jun\/19\/code-spaces-rip-code-hosting-provider-ceases-trading-after-well-orchestrated-ddos-attack\/\">the unfortunate story of Code Spaces<\/a>, the cloud provider which had to wave the white flag in June this year due to a DDoS attack. While their service was Amazon Web Services EC2, the hackers got in to the admin control panel, before creating backup logins and deleting data, backups and machine configurations.<\/p>\n<p>&ldquo;Customers, not vendors, are responsible for risk management,&rdquo; the report notes. &ldquo;While most enterprise SaaS providers have built-in support for two-factor authentication and IP restrictions that can be used with user accounts, sophisticated attackers can circumvent those controls through session hijacks and targeted malware.&rdquo;<\/p>\n<p>One customer in the study found over 100 Salesforce users with admin privileges. But that&rsquo;s not the biggest problem.<\/p>\n<p>11% of SaaS accounts are &lsquo;zombie&rsquo; accounts according to the study; accounts which haven&rsquo;t been touched for three months. There are perfectly good reasons why this could be the case, such as maternity leave. Yet 80% of companies still have at least one account on the system of a suspended or terminated employee.<\/p>\n<p>These dormant accounts are the perfect opening point for hackers, the report argues. &ldquo;An inactive account does not only represent a security risk, it&rsquo;s also a financial burden on the company,&rdquo; it argues. &ldquo;In many of the organisations we protect, we often see double digit percentages of zombies &ndash; these are licenses which the company is paying for even though they aren&rsquo;t being used.&rdquo;<\/p>\n<p>Similarly scary is the finding that the average company shares its files with 393 external domains, while 29% of employees share 98 corporate files with their personal email accounts on average. It can happen unintentionally through sync agents, but again it represents a serious security risk.<\/p>\n<p>What&rsquo;s more, 92% of respondents in a recent Forrester survey indicated their security controls for SaaS applications were effective. &ldquo;Security professionals with this mindset are rolling the dice with their sensitive data,&rdquo; said Forrester&rsquo;s Andras Cser. &ldquo;Perimeter and endpoint protections provide minimal protection against new, emerging and largely unknown threats.&rdquo;<\/p>\n<p><a href=\"http:\/\/www.cloudcomputing-news.net\/news\/2014\/nov\/03\/beware-fat-finger-when-it-comes-cloudy-data-loss\/\">Earlier this week<\/a> a report from Databarracks found that human error was responsible for one in five data loss incidents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Picture credit: iStockPhoto<br \/>\nA benchmark report by Adallom into the uptake of software as a service (SaaS) applications has found that Salesforce customers have the highest percentage of privileged access users &ndash; and warned about the problems that&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-11755","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=11755"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11755\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=11755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=11755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=11755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}