Expert Reaction On Solarwinds Blames Intern For Weak Passwords

Following the news around SolarWinds blaming an intern for creating the “Solarwinds123” password, cybersecurity expert commented below.

Experts Comments

March 02, 2021
Joseph Carson
Chief Security Scientist & Advisory CISO
Thycotic

The latest developments in relation to SolarWinds intern’s poor password choice highlight’s how bad password hygiene is getting and how important it is for organizations to prioritize password management. Password hygiene should be part of employee training and cyber awareness training, once a person knows how to connect to the internet they should be educated on how to use a password manager.  Organizations must help employees move passwords into the background so they do not have

.....Read More

The latest developments in relation to SolarWinds intern’s poor password choice highlight’s how bad password hygiene is getting and how important it is for organizations to prioritize password management. Password hygiene should be part of employee training and cyber awareness training, once a person knows how to connect to the internet they should be educated on how to use a password manager.  Organizations must help employees move passwords into the background so they do not have to choose or remember passwords, using privileged access security solutions helps organizations reduces the risk of weak passwords which is a common cause of many security incidents and data breaches.      

 

Do not ever reuse old or similar variations of passwords. If you continue to reuse old passwords it is like leaving your front door open and inviting cybercriminals into your home, stop doing it now otherwise expect you will become a victim of cybercrime.  Many password managers are free, start using them, use unique long passwords such as passphrases and use a password manager to keep all your passwords unique but easy to use.  For business, it is also important to move beyond password managers and start a journey to protecting privileged access with a privileged access management solution.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.