Posts by Barry Scott

Barry Scott is CTO of EMEA. An industry veteran with over 25 years’ experience working in the Windows, Unix and Linux space helping major organisations in almost every industry vertical. The last 9 years of Barry's career have been spent helping organisations manage their Identity Management and Auditing challenges.

Hot Topics

5 Critical Topics in Cybersecurity Training

By , October 20, 2016

With European Cybersecurity Month in full swing, this week’s topic of discussion is “Cybersecurity Training.” Whilst cybersecurity training and awareness has undoubtedly improved, a common mistake is that it is often treated as a one-time tick-box exercise, rather than an ongoing process. As cyberthreats become part of the reality of daily business, the limitations of traditional security controls have been exposed and businesses need to recognise that cybersecurity is not simply a one-off task on the to-do list. A security breach is now assumed to be inevitable and whilst layering defensive security controls and tools are a step in the…

It's All About Identity

How Personal is Personal When It Comes to Handing Out Information?

By , July 26, 2016

Recent experiences have made me question just how much information we hand out nowadays to people we barely know. It seems that everyone wants a bit of our personal information, and more often than not we are happy to provide it. Even from my recent experiences selling a flat, it was surprising how much personally identifiable information the estate agent needed to see. I was asked to send all sorts of documents, from passport details to bank statements, often over e-mail. As someone keen to sell a flat, I did it without question of course — we all want the…

It's All About Identity

Why a Simple Password Reset is Not Enough

By , May 9, 2016

Recently, a number of Amazon account holders received e-mails proposing a password reset out of “an abundance of caution.” This was a result of routine monitoring, in which Amazon discovered a list of e-mail addresses and passwords that had been posted online. Whilst the list was not Amazon-related, experience has shown that users regularly re-use their passwords across multiple websites. As such, Amazon sent out e-mails to all users whose addresses and passwords were on the list, with instructions urging a complete password reset. Whilst Amazon itself wasn’t breached, it is certainly noteworthy that its usual surveillance processes unearthed this list…

It's All About Identity

Chain Reaction — Strengthening the Weakest Link with Third Party Identity Management

By , April 7, 2016

Dealing with third parties is an inevitability of modern day business, and so too is the risk of a data breach. Unfortunately, the two often go hand in hand. Organisations are subject to the security of their supply chain, partners and contractors, and need to verify the legitimacy of these third parties. Allowing them external access to your corporate network puts additional strain on IT managers and Sysadmins to maintain business productivity without compromising security. Businesses must incorporate an additional layer of defence in order to protect sensitive corporate data from the threats posed by potentially less security-minded third parties,…

Hot Topics

ABC…Easy as 1-2-3 (When it Comes to Passwords Anyway)

By , February 18, 2016

The new year usually brings new intentions and often changes to old habits. But it seems that old habits die hard, especially when it comes to changing our passwords. According to SplashData’s list of the worst passwords of 2015, it’s the same old story. Highlighting the insecure habits of users, once again ‘123456’ and ‘password’ rank as the most commonly used passwords — just as they have since the company’s first list in 2011. It seems incredible that people continue to put themselves and their personal data at risk, especially after a year of increasingly high profile attacks on consumer…

Centrify Perspective

Should Passwords Have a “Best Before” Date?

By , November 16, 2015

I recently touched on the GCHQ/CESG password report about passwords — ‘Password Guidance – Simplifying Your Approach’ — a government best practice document aimed at UK organisations and designed to help protect against password breaches. Should changing passwords be mandatory? As a general guidance document, it makes some valuable suggestions and recommendations on password practices. However it was interesting to see the comments around changing passwords. It says that “most administrators will force users to change their password at regular intervals, typically every 30, 60 or 90 days,” but suggests that this “imposes burdens on the user” and “carries no real benefits.” While we…

Hot Topics

Sharing – is it Just a Generational Thing?

By , September 28, 2015

It’s good to share, but I do wonder if perhaps we share a bit too much nowadays. Passwords to some of our most sensitive information are a good example of this. I was on the train a few weeks ago and a woman of about 20 years of age got on. Four stops later, I knew her doctor’s name and the details of her next appointment, the username and password to one of her accounts that she decided to share with her mother, and credit card information. This could have been a case study on what not to do —…

Centrify Perspective

Rage Against the Machine — Are Passwords Driving Us Mad?

By , August 20, 2015

It’s said that if you listen very carefully you can hear grown men and women in offices across the country weep as, head in hands, they try desperately to remember their passwords. There’s little doubt that we’re becoming increasingly frustrated with the sheer number of passwords we have to remember every day. According to a Centrify survey last year looking at digital identities, over a quarter of respondents said they enter a password online more than 10 times a day, which is potentially 3,500 to 4,000 times a year. It’s no surprise our frustrations are getting the better of us. IT…

It's All About Identity

Privilege vs. Productivity

By , April 16, 2015

Access to sensitive data is a constant worry; we only need to switch on the news to see another story of an attack or data breach. With concern mounting, it’s easy to see why there is high demand for new solutions to combat these threats. With many businesses struggling to keep up with the demands of employees working in different locations, logging on from home, or traveling with mobile devices, there is an increasing need to manage the security of employee accounts. Appropriate assignment of administrative privileges is seen as one of the top security challenges. Restricting and protecting highly…