WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure. Credit: Thinkstock It is hard to believe that it’s already been a year since the WannaCry malicious software was released upon the world. Thousands of systems were destroyed and many took the option of paying the attackers for the key to decrypt their unstructured data. Files that, for whatever reason, had not been backed up. All of this because of SMB v1 was, and in many cases, is still in use today.The carnage that was wrought on systems around the world allegedly executed by the Lazarus Group serves to underscore not that the Shadow Brokers had released purloined NSA tools, rather this highlighted a far more sinister aspect of enterprises which has lingered in the dark. That problem is the burgeoning security debt that has accumulated over years of missed patches, derelict administrative level accounts and accepted risks that have never been resolved.The victims of this attack were not merely corporate systems that had spreadsheets and projections cryptographically locked. There were healthcare facilities that were compromised as well when their own defenses failed to provide them protection.The severity of the situation can best be illustrated by the surgeries in hospitals that had to be postponed is one salient example. Imagine if someone had expired as a result of these postponements. While criminal groups with various nefarious intentions consume the headlines with the latest tools to be leaked, we must look at how we collectively managed to arrive at this point in time. Hurdling the deadline wallOver years of scrambling to meet unachievable timelines to deliver projects, many organizations have seen projects side-step any sort of security oversight in order to get to market on time. It is just these sorts of unrealistic time-to-market issues that have left us holding the proverbial bag or security issues that have accumulated over time. One overly utilized practice is that of accepting the risk. This occurs when an organization deems it is far less of a risk to the organization to make note of the issue and accept it as a known problem rather that to remedy the situation.The problem here is that these accepted risks are seldom revisited again once they have been noted. As a result, a problem that may have been seen as being manageable at a point in time can grow in time into something worse. Especially when you consider that a potential vulnerability can be made worse in concert with another vulnerability that may be discovered later on or though the simple application of the law of unintended consequences. The end of “open sesame” passwordsIn addition to risks that may have been signed off on, we have the issue of administrative-level accounts that may have become unused or no longer necessary with the passage of time. These accounts may have easily-guessed passwords as just one scenario. Or even worse is the default admin account. One organization that I did some work for many years ago had default administrative-level credentials on every system on the network. To make matters even worse, this was one of the worst kept secrets within the organization.This gives way to a discussion on the need for multi-factor authentication as a logical replacement for static passwords. If you have a web-delivered application, there is no solid rationale as to why there isn’t at least two-factor authentication, or a multi-factor authentication gateway to marshal access to it. But, that’s a longer conversation.Years ago I worked for critical infrastructure company that had a control system vendor in-house with a hard coded password in their software. This was an untenable point for us as an operator and could not in good conscience leave that in place knowing the potential complications that could arise if that were to be discovered by an adversary.We put it to the vendor and asked for them to fix the password issue and their response was that it would be hundreds of thousands of dollars to change the hard-coded password. This was simply amazing to us as a customer. How the audacity of a vendor could be so poignant was unfathomable. Customers need to hold their suppliers’ feet to the fire so that problems like this do not persist in the future.Installing the complacency patchNow that we find ourselves contemplating the issues of the WannaCry debacle a year later, we have to tackle the security debt. We need to a get long concerted look into the risks that have been accepted in the past and where they are on the path to being remedied. I’m willing to bet that there has been little to nothing done with risks that were accepted more than a year before today’s date. Anything older than that has a tendency to slip into the mists of time.To put a fine point on the discussion, WannaCry is a problem that never needed to happen and we can do so much better than we have in this regard. Related content opinion The router of all evil Discusses research on threats to home routers, which recently became the target of a Russian malware campaign using the “VPNfilter” malware. By Jul 19, 2018 5 mins Cyberattacks Routers Technology Industry opinion Cyber games at the World Cup 2018 Analysis of cyberthreats at the World Cup looking back at cyberattacks from the last tournament and predictions for this year. By Martin McKeay Jun 11, 2018 6 mins Technology Industry Cyberattacks Physical Security opinion Your cache is exposed On February 28, Akamai recorded a 1.35 Tbps DDoS attack driven by a relatively new vector, memcached reflection. Memcached can have an amplification factor of roughly 500,000 times larger than the initial query, which allows small set of exposed mach By Chad Seaman Apr 13, 2018 6 mins Technology Industry Data and Information Security Network Security opinion The ethics of AI in the shadow of GDPR Just because we can do something does not necessarily mean that we should. There needs to be a far more cogent discussion as to the ethics of AI and how data security and privacy will be addressed. By Dave Lewis Mar 26, 2018 5 mins Technology Industry Data and Information Security Privacy Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe