© Morey J. Haber and Brad Hibbert 2018Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_2
2. Shared User Credentials
Morey J. Haber1 and Brad Hibbert2
Heathrow, Florida, USA
Carp, Ontario, Canada
One of the most cardinal rules in cybersecurity is never to share your password with anyone and at any time. Realistically, that is not possible. Whether it is a colleague, or contractor, there are no sound use cases when it should be done; ever! That said, many employees continue to share passwords in times of emergency, to delegate tasks, or to overcome issues in planning with sick leave and vacation - being two common culprits.
The problem with shared credentials is that once they are out of your ...