Guidelines for Safeguarding New Hires Without Revealing Ephemeral Passkeys

Jul 23, 2024The Hacker NewsCorporate Security / Data Protection

During the initial integration phase, it’s vitally important for both newcomers and organizations to follow a secure approach.

How to Securely Onboard New Employees Without Sharing Temporary Passwords

Jul 23, 2024The Hacker NewsCorporate Security / Data Protection

How to Securely Onboard New Employees Without Sharing Temporary Passwords

During the initial integration phase, it’s vitally important for both newcomers and organizations to follow a secure approach. Yet, this phase often entails the sharing of transient first-day access keys, posing potential security threats to enterprises.

Traditionally, IT departments have found themselves limited to either transmitting passcodes in plain text via email or SMS, or organizing face-to-face meetings to verbally relay this confidential data. Both techniques carry inherent hazards, ranging from man-in-the-middle breaches to mere human errors in safeguarding passkeys. This susceptibility gives cyber intruders the opportunity to exploit weak or intercepted codes to gain illegal entry into corporate platforms.

In this write-up, we delve into the drawbacks of conventional password dissemination practices during staff orientation and introduce an approach that heightens security measures without compromising the simplicity of onboarding for fresh recruits. Organizations have the means to fortify their digital landscapes right from the outset, ensuring a secure and seamless induction for new team members.

Does the fleeting nature of passkeys stay unchanged?

Ephemeral passwords present considerable security risks mainly because end users frequently neglect to change them, notwithstanding their intended temporary nature. These codes are typically designated to be replaced by the user after their initial login; however, this pivotal step can be overlooked or omitted due to various factors such as user neglectfulness or technical glitches in the onboarding process. When temporary codes go unchanged, they continue to be prone to attacks as they are typically feeble and easily anticipated.

The hazards associated with these transient passkeys are escalated by the pattern of simplicity or predictability often adhered to by users, rendering them easy prey for brute force or dictionary attacks. Specops research revealed tens of thousands of malware-acquired credentials containing base terms like ‘welcome’, ‘guest’, ‘user’, and ‘change’ in the past year alone. End users may neglect password alterations due to a lack of comprehension about security protocols or simply because the system does not mandate a password update upon first login. Moreover, if these passcodes are shared in plain text, they can potentially be intercepted by unauthorized entities.

An actual breach stemming from the misuse of ephemeral passwords is exemplified in the case involving the SolarWinds software company. Perpetrators managed to infiltrate the company’s Orion platform using a basic, publicly known passcode: “solarwinds123”. This code was meant to be temporary but remained unchanged, triggering a notorious cyberattack that compromised numerous organizations.

Safety concerns with traditional passcode sharing

Traditionally, companies have leaned on two chief methods to distribute initial passwords to new hires, each fraught with its own set of security pitfalls. The first method involves sharing passcodes in plain text, typically via email or SMS. While this approach is direct and commonly preferred for its simplicity and convenience, it harbors substantial security risks. Plain text communication can be intercepted by cyber felons through man-in-the-middle assaults. Once intercepted, these credentials can be exploited to illicitly access corporate systems, potentially leading to data breaches and other security breaches.

The second traditional method entails verbally sharing passcodes on the first day of a new employee. This sharing can occur either face-to-face or over the phone. Although this method diminishes the risk of interception compared to digital plain text communications, it still carries vulnerabilities. Verbal transmissions heavily rely on the availability and coordination between IT personnel and the newcomer, which can be tactically intricate and prone to blunders. Furthermore, if the passcode is relayed through a third party, such as a supervisor, it adds another layer of risk where the passcode could be mishandled or inadvertently exposed.

Both methods, though commonplace, fall short of furnishing a secure and dependable means of handling sensitive data like passcodes. They jeopardize organizations by exposing them to potential security breaches and are inconsistent with best practices in information security management.

Introducing a Secure Method for New User Onboarding Minus Transient Passkeys

Initiating new user onboarding in a more secure manner is vital for fortifying organizational data right from the outset. Specops Software now presents its First Day Password feature as part of Specops uReset to rectify the security gaps inherent in traditional passcode distribution practices during employee initiation.

This tool revolutionizes passcode management by obviating the necessity to directly share initial passcodes with fresh recruits. Instead of receiving a temporary passkey that could be intercepted or mishandled, new hires are empowered to establish their own passcodes through a secure system.

Here’s how it works: upon joining, new recruits receive an enrollment link via text, personal email, or through a “reset my passkey” link on their domain-linked device. This link directs them to a verification screen where they confirm their identity using their personal email or mobile number. Once verified, they proceed to a dynamic feedback screen where they can devise their unique passcode in compliance with the organization’s passcode policy.

This method not only secures the passcode creation process but also seamlessly integrates with other Specops products like Specops Password Policy with Breached Passkey Protection. This tool enhances security further by fostering the formulation of longer passcodes and prohibiting the use of over 4 billion known compromised passcodes. This comprehensive approach ensures that starting day onwards, end users possess secure, compliant passcodes, substantially mitigating the risks posed by cyber threats.

By utilizing Specops’ First Day Passkey and its integrated security features, organizations can furnish a more secure onboarding experience that shields both the fresh user and the company’s digital assets. Engage with an expert to explore how First Day Passkey could align with your organization.

Discovered this article intriguing? This article is a partnered contribution. Stay updated by following us on Twitter and LinkedIn for access to more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.