{"id":39691,"date":"2019-09-27T13:00:51","date_gmt":"2019-09-27T13:00:51","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2019\/sep\/27\/three-reasons-why-killing-passwords-improves-your-cloud-security\/"},"modified":"2019-09-27T13:00:51","modified_gmt":"2019-09-27T13:00:51","slug":"three-reasons-why-killing-passwords-will-improve-your-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/three-reasons-why-killing-passwords-will-improve-your-cloud-security\/","title":{"rendered":"Three reasons why killing passwords will improve your cloud security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/technology-internet-cyber-security-and-data-security-online-network-vector-id1150512329.jpg\"><\/p>\n<ul>\n<li>87% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types, based on&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/05\/08\/how-to-secure-mobile-devices-in-a-zero-trust-world\/#13a3950f4ebe\" rel=\"noopener noreferrer\" >Verizon&rsquo;s Mobile Security Index 2019<\/a>.<\/li>\n<li>66% of IT professionals say&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/01\/07\/83-of-enterprise-workloads-will-be-in-the-cloud-by-2020\/#3b2bfa3d6261\" rel=\"noopener noreferrer\" >security is their most significant concern<\/a>&nbsp;in adopting an enterprise cloud computing strategy.<\/li>\n<li>Enterprises are predicted to spend $12.6bn&nbsp;on cloud security tools by 2023, up from $5.6B in 2018,&nbsp;<a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-security-spend-set-to-reach-$126b-by-2023\/d\/d-id\/1334473\" rel=\"noopener noreferrer\" >according to Forrester<\/a>.<\/li>\n<\/ul>\n<p>Jack Dorsey&rsquo;s&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/08\/30\/twitter-founder-jack-dorseys-account-hacked\/\" rel=\"noopener noreferrer\" >Twitter account getting hacked<\/a>&nbsp;by having his telephone number transferred to another account without his knowledge is a wake-up call to everyone of how vulnerable mobile devices are. The&nbsp;<a href=\"https:\/\/www.vice.com\/en_us\/article\/zm8a9y\/how-to-protect-yourself-from-sim-swapping-hacks\" rel=\"noopener noreferrer\" >hackers relied on SIM swapping<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.vice.com\/en_us\/article\/zm8a9y\/how-to-protect-yourself-from-sim-swapping-hacks\" rel=\"noopener noreferrer\" >convincing Dorsey&rsquo;s telecom provider to bypass requiring a passcode<\/a>&nbsp;to modify his account. With the telephone number transferred, the hackers accessed the Twitter founder&rsquo;s account. If the telecom provider had adopted zero trust at the customer&rsquo;s mobile device level, the hack would have never happened.<\/p>\n<h3><strong>Cloud security&rsquo;s weakest link is mobile device passwords<\/strong><\/h3>\n<p>The Twitter CEO&rsquo;s account getting hacked is the latest in a series of incidents that reflect how easy it is for hackers to gain access to cloud-based enterprise networks using mobile devices.&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/05\/08\/how-to-secure-mobile-devices-in-a-zero-trust-world\/#13a3950f4ebe\" rel=\"noopener noreferrer\" >Verizon&rsquo;s Mobile Security Index 2019<\/a>&nbsp;revealed that the&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/05\/08\/how-to-secure-mobile-devices-in-a-zero-trust-world\/#13a3950f4ebe\" rel=\"noopener noreferrer\" >majority of enterprises, 67%,<\/a>&nbsp;are the least confident in the security of their mobile assets than any other device.<\/p>\n<p>Mobile devices are one of the most porous threat surfaces a business has. They&rsquo;re also the fastest-growing threat surface, as every employee now relies on their smartphones as their ID.<a href=\"https:\/\/www.idg.com\/\" rel=\"noopener noreferrer\" >&nbsp;IDG&rsquo;s<\/a>&nbsp;recent survey completed in collaboration with&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\" rel=\"noopener noreferrer\" >MobileIron<\/a>, titled&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\/resources-library\/whitepapers\/say-goodbye-to-passwords\" rel=\"noopener noreferrer\" >Say Goodbye to Passwords<\/a>&nbsp;found that 89% of security leaders believe that mobile devices will soon serve as your digital ID to access enterprise services and data.<\/p>\n<p>Because they&rsquo;re porous, proliferating and turning into primary forms of digital IDs, mobile devices and their passwords are a favorite onramp for hackers wanting access to companies&rsquo; systems and data in the cloud. It&rsquo;s time to kill passwords and shut down the many breach attempts aimed at cloud platforms and the valuable data they contain.<\/p>\n<h3><strong>Three reasons why killing passwords improves your cloud security<\/strong><\/h3>\n<p>Killing passwords improve cloud security by:<\/p>\n<ul>\n<li><strong>Eliminating privileged access credential abuse.<\/strong>&nbsp;Privileged access credentials are best sellers on the&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3249765\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html\" rel=\"noopener noreferrer\" >Dark Web<\/a>, where hackers bid for credentials to the world&rsquo;s leading banking, credit card, and financial management systems.&nbsp;<a href=\"https:\/\/www.forrester.com\/report\/The+Forrester+Wave+Privileged+Identity+Management+Q3+2016\/-\/E-RES123903\" rel=\"noopener noreferrer\" >Forrester<\/a>&nbsp;estimates that 80% of data breaches involve compromised privileged credentials, and a recent survey by&nbsp;<a href=\"https:\/\/www.centrify.com\/\" rel=\"noopener noreferrer\" >Centrify<\/a>&nbsp;found that&nbsp;<a href=\"https:\/\/www.centrify.com\/resources\/industry-research\/pam-survey\/\" rel=\"noopener noreferrer\" >74% of all breaches involved privileged access abuse<\/a>. Killing passwords shuts down the most common technique hackers use to access cloud systems.<br \/>\n\t&nbsp;<\/li>\n<li><strong>Eliminating the threat of unauthorized mobile devices accessing business cloud services and exfiltrating data.<\/strong>&nbsp;Acquiring privileged access credentials and launching breach attempts from mobile devices is the most common hacker strategy today. By killing passwords and replacing them with a&nbsp;<a href=\"https:\/\/go.forrester.com\/blogs\/what-ztx-means-for-vendors-and-users\/\" rel=\"noopener noreferrer\" >zero-trust framework<\/a>, breach attempts launched from any mobile device using pirated privileged access credentials can be thwarted. Leaders in the area of mobile-centric zero trust security include&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\" rel=\"noopener noreferrer\" >MobileIron<\/a>,&nbsp;whose&nbsp;<a href=\"https:\/\/www.mobileiron.com\/en\/blog\/Enabling-zero-sign-on-by-replacing-passwords-with-mobile-as-ID\" rel=\"noopener noreferrer\" >innovative approach to zero sign-on<\/a>&nbsp;solves the problems of passwords at scale. When every mobile device is secured through a zero-trust platform built on a foundation of unified endpoint management (UEM) capabilities,&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/05\/08\/how-to-secure-mobile-devices-in-a-zero-trust-world\/#13a3950f4ebe\" rel=\"noopener noreferrer\" >zero sign-on from managed and unmanaged services become achievable for the first time<\/a>.<br \/>\n\t&nbsp;<\/li>\n<li><strong>Giving organizations the freedom to take a least-privilege approach to grant access to their most valuable cloud applications and platforms<\/strong>. Identities are the new security perimeter, and mobile devices are their fastest-growing threat surface. Long-standing traditional approaches to network security, including &ldquo;trust but verify&rdquo; have proven ineffective in stopping breaches. They&rsquo;ve also shown a lack of scale when it comes to protecting a perimeter-less enterprise. What&rsquo;s needed is a zero-trust network that validates each mobile device, establishes user context, checks app authorization, verifies the network, and detects and remediates threats before granting secure access to any device or user. If Jack Dorsey&rsquo;s telecom provider had this in place, his and thousands of other people&rsquo;s telephone numbers would be safe today.<\/li>\n<\/ul>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>The sooner organizations move away from being so dependent on passwords, the better. The three reasons why killing passwords improve cloud security are just the beginning. Imagine how much more effective distributed DevOps teams will be when security isn&rsquo;t a headache for them anymore, and they can get to the cloud-based resources they need to get apps built.<\/p>\n<p>With more organizations adopting a mobile-first development strategy, it makes sense to have a mobile-centric zero-trust network engrained in key steps of the DevOps process. That&rsquo;s the future of cloud security, starting with the DevOps teams creating the next generation of apps today.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\"><span style=\"color:blue\"><img decoding=\"async\" alt=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" src=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" style=\"height:59px; width:272px\" \/><\/span><\/a><strong>Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases<\/strong>? Attend the <a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\">Cyber Security &amp; Cloud Expo World Series<\/a> with upcoming events in Silicon Valley, London and Amsterdam to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>87% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types, based on&nbsp;Verizon&rsquo;s Mobile Security Index 2019.<br \/>\n66% of IT professionals say&nbsp;security is their most significant concern&nbsp;in ado&#8230;<\/p>\n","protected":false},"author":56,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-39691","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=39691"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39691\/revisions"}],"predecessor-version":[{"id":39692,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/39691\/revisions\/39692"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=39691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=39691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=39691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}