News

03:03 PM
Jonathan Camhi
Jonathan Camhi
Slideshows
Connect Directly
Facebook
Twitter
Google+
RSS
E-Mail
50%
50%

A Growing Security Risk in IT Automation

The increasing use of automated processes could expose organizations to new forms of malware if proper monitoring and controls aren’t put in place.
Previous
2 of 4
Next


However many organizations don’t have the necessary controls in place around their SSH keys for automated processes to protect against potential hackers, the study found. Only 44% of the organizations in the study said they are monitoring the logins and activities of their keys’ privileged users.

[For More of Our Security Coverage, Check Out: 7 Security Predictions for 2014 from Booz Allen Hamilton]

This lack of security controls is largely due to a misunderstanding of the role of secure shell in data security, SSH’s Thompson notes. While 68% of the survey respondents said that data security was a critical priority, only 25% said the same about machine-to-machine security. “Many companies just haven’t thought about secure shell controls,” he says. But “if anyone has malware in that environment, the organization would have a real challenge. This is where some of the most critical data often is.”

 

Jonathan Camhi has been an associate editor with Bank Systems & Technology since 2012. He previously worked as a freelance journalist in New York City covering politics, health and immigration, and has a master's degree from the City University of New York's Graduate School ... View Full Bio

Previous
2 of 4
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
KBurger
50%
50%
KBurger,
User Rank: Strategist
3/10/2014 | 1:39:39 PM
re: A Growing Security Risk in IT Automation
I would hope that banking overall is far along with these kinds of efforts, although I would imagine it may be more of a challenge (not just technology, but also awareness/education) for smaller institutions.
Byurcan
50%
50%
Byurcan,
User Rank: Author
3/9/2014 | 2:38:52 AM
re: A Growing Security Risk in IT Automation
Surprising that only 44 percent of organizations polled monitor the logins of their keys' priveleged users, Thompson's comment that most companies haven't thought to much about SSh controls is telling.
Register for Bank Systems & Technology Newsletters
White Papers
Current Issue
Slideshows
Video