London: 020 0200 8142

Top 5 Most Common Network Vulnerabilities: Storing Data as Clear Text

Part 4:5  Storing Data as Clear Text

clear text Storing data in the clear During a pen test, our InfoSec experts usually report the same security dangers, whatever the client size or type. In this weekly series, we explore five common vulnerabilites and share practical advice you can follow today. In this 4th part, we address the risks of storing passwords and other sensitive data as clear text.

We use encrypted hard drives, data must be protected, right?

Once a foothold is established on the network, it’s common for attackers to move laterally within the environment and attempt to compromise other systems – including end-user devices – to harvest sensitive data: passwords, financial reports, network diagrams, HR records, and everything in between.

On internal network engagements, we often find passwords for critical systems such as firewalls stored in text files or spreadsheets on staff computers. This accelerates our attack as we don’t have to perform time-costly password guessing.

With the wide deployment of hard disk encryption for end user devices and storage devices, it would be easy to assume that data is adequately protected. However, anytime a system is online and connected to the internal network, there’s a risk that compromised credentials or vulnerabilities could be used to access the system over the network for stealing sensitive details.

Securing passwords

To keep passwords out of hackers’ hands, it’s best to use a password manager – either running on the local machine, such as KeePass (1) or online services (2) with enterprise level features.

The passwords are stored encrypted and protected by a master password or phrase. For extra peace of mind, some services support multi-factor authentication.

Another advantage is that long and complex passwords can be created and stored for every service that needs securing, reducing password re-use across systems. This greatly impedes password guessing and cracking attacks.

Securing documents

As well as passwords, documents are also exposed when stored on users’ devices. Protecting them will vary, from password-protecting reports and spreadsheets on a case-by-case basis, to a secure file storage solution.

If possible, store local copies of sensitive documents encrypted, and decrypt as needed.

If an attacker gains access to a system, they may be able to compromise files in use, but not the entire collection. If local storage isn’t desirable, it’s possible to store these documents remotely using a service such as Microsoft OneDrive (3), Box (4) or Dropbox (5).

If even greater security and privacy is needed, encrypt documents before they’re synched to the cloud, using something like Boxcryptor (6).

Conclusions and advice for protecting your data 

It’s worth remembering that using hard disk encryption on end user devices is only effective when the devices are not in use, and not connected to a network which may have hostile elements present.

Once privileged credentials are compromised, or a vulnerability exploited, an attacker could connect stealthily to other devices and look for sensitive information. This is why it’s important to use additional measures for keeping passwords and sensitive documents safe.

(1)  KeePass

(2)  Online services

(3)  Microsoft OneDrive

(4)  Box

(5)  Dropbox

(6)  Boxcryptor

We are Perspective Risk

  • Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.

    Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.

    Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.

  • Call Me

    Pop your details in below and we’ll be in touch soon!

    • This field is for validation purposes and should be left unchanged.

    ×
    Get Quote
    • This field is for validation purposes and should be left unchanged.
    ×