Posts by Barry Scott

Barry Scott is CTO of EMEA. An industry veteran with over 25 years’ experience working in the Windows, Unix and Linux space helping major organisations in almost every industry vertical. The last 9 years of Barry's career have been spent helping organisations manage their Identity Management and Auditing challenges.

Hot Topics

Am I Affected by the European General Data Protection Regulation?

By , May 4, 2017

It’s a year until the biggest shakeup to Europe’s privacy laws in nearly a generation takes effect. The European General Data Protection Regulation (GDPR) will bring sweeping new rules into force, including new consumer rights over how personal data is used, and mandatory 72-hour data breach notifications. Yet there’s still confusion over which companies and what types of data are covered by the law. With firms currently complying with less than 40% of GDPR principles on average, time is running out. That’s why Centrify is running a new monthly blog series designed to raise awareness about the GDPR, as the clock…

Centrify Perspective

Pass(word)ing the buck!

By , February 9, 2017

The start of the New Year is always an interesting time in the security community. Out come the statistics and stories about the worst passwords and the most common ones chosen by online users during the previous year. A recent story in the UK national press suggests that half of all online users worldwide use just 25 passwords between them — and of course, none of the passwords are very secure and hackers could easily crack them. In what seems like Groundhog Day the most common password is once again 123456, followed by 123456789 (so we can assume some popular…

Hot Topics

EU GDPR, Mandatory Data Breach Notification and How Centrify Helps

By , December 1, 2016

Breach notification rules in the upcoming EU GDPR (General Data Protection Regulation) will mean data breaches are far more likely to become public, where today it is possible (although probably ill-advised) to try and sweep them under the carpet. The 2016 Verizon Data Breach Investigations Report stated “63% of confirmed data breaches involved weak, default or stolen passwords.” Centrify protects against the leading point of attack used in data breaches – compromised credentials – and can therefore reduce the risk of breaches taking place. EU GDPR Background The EU GDPR will apply from 25th May 2018, and although that seems like a long time from now, companies may find they…

Hot Topics

5 Critical Topics in Cybersecurity Training

By , October 20, 2016

With European Cybersecurity Month in full swing, this week’s topic of discussion is “Cybersecurity Training.” Whilst cybersecurity training and awareness has undoubtedly improved, a common mistake is that it is often treated as a one-time tick-box exercise, rather than an ongoing process. As cyberthreats become part of the reality of daily business, the limitations of traditional security controls have been exposed and businesses need to recognise that cybersecurity is not simply a one-off task on the to-do list. A security breach is now assumed to be inevitable and whilst layering defensive security controls and tools are a step in the…

It's All About Identity

How Personal is Personal When It Comes to Handing Out Information?

By , July 26, 2016

Recent experiences have made me question just how much information we hand out nowadays to people we barely know. It seems that everyone wants a bit of our personal information, and more often than not we are happy to provide it. Even from my recent experiences selling a flat, it was surprising how much personally identifiable information the estate agent needed to see. I was asked to send all sorts of documents, from passport details to bank statements, often over e-mail. As someone keen to sell a flat, I did it without question of course — we all want the…

It's All About Identity

Why a Simple Password Reset is Not Enough

By , May 9, 2016

Recently, a number of Amazon account holders received e-mails proposing a password reset out of “an abundance of caution.” This was a result of routine monitoring, in which Amazon discovered a list of e-mail addresses and passwords that had been posted online. Whilst the list was not Amazon-related, experience has shown that users regularly re-use their passwords across multiple websites. As such, Amazon sent out e-mails to all users whose addresses and passwords were on the list, with instructions urging a complete password reset. Whilst Amazon itself wasn’t breached, it is certainly noteworthy that its usual surveillance processes unearthed this list…

It's All About Identity

Chain Reaction — Strengthening the Weakest Link with Third Party Identity Management

By , April 7, 2016

Dealing with third parties is an inevitability of modern day business, and so too is the risk of a data breach. Unfortunately, the two often go hand in hand. Organisations are subject to the security of their supply chain, partners and contractors, and need to verify the legitimacy of these third parties. Allowing them external access to your corporate network puts additional strain on IT managers and Sysadmins to maintain business productivity without compromising security. Businesses must incorporate an additional layer of defence in order to protect sensitive corporate data from the threats posed by potentially less security-minded third parties,…

Hot Topics

ABC…Easy as 1-2-3 (When it Comes to Passwords Anyway)

By , February 18, 2016

The new year usually brings new intentions and often changes to old habits. But it seems that old habits die hard, especially when it comes to changing our passwords. According to SplashData’s list of the worst passwords of 2015, it’s the same old story. Highlighting the insecure habits of users, once again ‘123456’ and ‘password’ rank as the most commonly used passwords — just as they have since the company’s first list in 2011. It seems incredible that people continue to put themselves and their personal data at risk, especially after a year of increasingly high profile attacks on consumer…

Centrify Perspective

Should Passwords Have a “Best Before” Date?

By , November 16, 2015

I recently touched on the GCHQ/CESG password report about passwords — ‘Password Guidance – Simplifying Your Approach’ — a government best practice document aimed at UK organisations and designed to help protect against password breaches. Should changing passwords be mandatory? As a general guidance document, it makes some valuable suggestions and recommendations on password practices. However it was interesting to see the comments around changing passwords. It says that “most administrators will force users to change their password at regular intervals, typically every 30, 60 or 90 days,” but suggests that this “imposes burdens on the user” and “carries no real benefits.” While we…