Password apathy common among IT workers, survey finds

Many IT professionals are apathetic about changing their enterprise passwords and lack rudimentary understanding of IT security, particularly in the areas of password control and privileged log-ins, according to a survey.

Hackers often exploit vulnerabilities in these two areas to breach an organization’s systems and networks. But despite the dramatic spike in data breaches over the past year, senior management in many organizations fails to understand the basics of IT security, said Philip Lieberman, president and CEO of Lieberman Software, a security management company that conducted the survey.

“Password anarchy among the IT staff at major organizations is mirrored by password apathy at the top of the management hierarchy, where senior management seem almost criminally lax in the enforcement of IT security policies - to the detriment of their organizations,” he said.

The company surveyed more than 300 IT professionals to get a sense of password and security practices. Respondents worked in small to large-sized organizations, with the majority (62 percent) saying their organization employed more than 10,000 people.

Survey highlights include:

  • 26 percent of respondents said at least one IT staff member in their organization has abused a privileged login to access information.
  • 51 percent of respondents said they have to remember 10 or more passwords for different systems and applications on their jobs.
  • 42 percent of IT professionals said two or more IT staff in their organization share a password to access a system or application.
  • 48 percent of respondents said a privileged password for a system, network device or application goes unchanged in their organization for more than 90 days.
  • More than 48 percent of survey participants said they have worked at an organization whose systems got compromised by a hacker.

“Management will have to pay far more attention to their basic security practices or be forced to apologize to their shareholders and customers for major data losses and subsequent damage to brand loyalty,” Lieberman said. “The simple, unpalatable truth is that senior management generally is not policing their IT security departments enough to avoid further massive data breaches.”

The 2011 Survey of IT Professionals polled more than 300 IT professionals who attended HP Protect 2011 in Washington, D.C.

About the Author

Camille Tuutti is a former FCW staff writer who covered federal oversight and the workforce.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Fri, Dec 9, 2011 Bob

"Many IT professionals ... lack rudimentary understanding of IT security, particularly in the areas of password control " I don't believe that the problem is a lack of understanding, it's more that the rules are impossible to follow. Think about it, I have about 15 passwords, many of them require 14 characters with a combination of upper case, lower case and special characters. When it's time to change your password, many of them require that you don't have too many of the same characters that you previously had, and to top it off, you are supposed to remember all of these passwords (15 in my case) without writing them down. Let me ask you, how many people in the world have a photographic memory good enough to be capable of remembering all of these passwords especially when they constantly need to be changed. I would guess a handful of people (maybe RainMan and a few others).

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group