Everyone makes mistakes once in a while. Maybe not all the time, but who hasn’t reused a password or ignored a software update? But any time someone ignores security best practices adds to your risk. The Cybersecurity and Infrastructure Security Agency (CISA) recognizes these risks and has released a Bad Practices page on its website. What does that mean for businesses (or those in the business of protecting digital assets)?

“All organizations, and particularly those supporting designated Critical Infrastructure or National Critical Functions (NCF) should implement an effective cybersecurity program to protect against cyber threats and manage cyber risk in a manner commensurate with the criticality of those NCFs to national security, national economic security, and/or national public health and safety,” the website states.

As of this writing, the CISA named just two bad practices. Meanwhile, CISA is still building the list. What the CISA guidelines are missing, however, are next steps. How can you avoid these bad practices? Here’s some guidance on how to take action.

CISA Advice: Avoid Older Software

First, don’t use unsupported or end-of-life software. This is extra important if your business is in critical infrastructure and NCF.

Threat actors can easily exploit these. After all, they know defenders probably won’t be able to patch any vulnerabilities they find. Running software beyond its use-by date leads to malware and ransomware attacks and puts data and other important assets at risk of compromise or theft. Other tips include:

  • When possible, use managed service providers who handle software updates and offer software upgrades when software has reached its end-of-life cycle
  • Work with vendors that offer software support, even for a fee, for a limited time until you are able to fully upgrade to the new software version
  • When purchasing software, ask about its lifecycle so you can budget for upgrades
  • Conduct regular audits of software and devices
  • Upgrade hardware that supports current software. Too often, people use older software because legacy systems can’t handle the upgrade. Better to spend money on new devices than on fines for a data breach caused by an end-of-life exploit.

Don’t Reuse Passwords

The second bad practice CISA recommends is to use known, fixed or default passwords and credentials.

More and more, attackers are turning to credential stuffing to enter networks. They do this most often through password compromise. In order to counteract this bad habit, keep up-to-date on the following suggestions from the CISA guidelines:

  • Change the default or fixed password on new devices right away. These passwords aren’t secure because they often follow a pattern set by the business that threat actors can easily figure out. IoT devices are at the greatest risk of using a default or fixed password, and more threat actors enter networks through compromised IoT.
  • Deploy an identity management platform. It is difficult to detect compromised credentials because the threat actor uses real IDs to get into the system. Identity management tools scan for strange login behaviors.
  • Closely monitor who has access to accounts and limit privileges as much as possible
  • Require employees to use unique passwords for each account
  • Use multifactor authentication everywhere
  • Don’t allow users to store passwords or credentials in browsers or on other devices, like smartphone apps
  • Consider using secure login options that don’t include passwords
  • Encourage users to log out of software where possible when they’re done working and to log off devices, or put them in sleep mode with a password to wake them
  • Avoid entering passwords in public locations, such as Wi-Fi in coffee shops and hotels
  • Never share a password, including default passwords, with anyone. In an emergency, the admin will be able to get access.

Only two bad practices may not go far, especially when they address some of the most commonly known threat vectors. However, CISA’s efforts show the need for even elementary security best practices and for everyone to take cybersecurity seriously.

More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today