Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Managing Risk – Default Passwords

Allow your security team to maintain a real-time directory of IT assets & associated security risks

It’s common knowledge default passwords are a security risk – especially when the same password is built into hardware from a vendor. 

Most companies are diligent about changing default passwords as a part of the device-provisioning process, but failure to take this critical step for even a single device can lead to disastrous consequences.

The US and UK governments recently issued a warning that foreign governments were sponsoring cyberattacks aimed at exploiting the vulnerability default passwords create in network infrastructure. 

This isn’t an isolated occurrence – devices with default passwords are an easy target for hackers since they can then authenticate malicious code and unauthorized devices, thus penetrating your company’s IT environment without your knowledge until it is too late.

Fortunately, this is a vulnerability your IT staff can easily identify with the right tools – closing the door to unauthorized intruders and identifying any rogue devices that may have already penetrated your company’s IT defenses. 

Virima is the right tool and a leader in this kind of protection, combining robust discovery capabilities with a Configuration Management Database (CMDB) solution to aggregate collected data and holds robust visualization tools that interpret findings to create actionable insights for decision-makers. 

Here is an overview of how Virima will help you address the default password risk:

Scan

Scan your infrastructure for default passwords on devices from common suppliers. Predefined scans are available for the most common device suppliers that ship products with default credentials.

Network Devices – Cisco, Juniper, Arista, Dell, and top wireless equipment manufacturers.

Servers – Dell, HP, IBM, and more.

Operating Systems – Windows, Mac, and Linux.

Run the scan once or schedule it as part of your continuous monitoring strategy. Define specific IP ranges to ensure both internal- and external-facing environments are secured. All discovered “open” assets are tagged as “unsecured” in the CMDB for ease of reporting.

Analyze

Convert discovered data into actionable insights to drive improvements. Informed decisions lead to confident actions.

Monitor risk exposure: Total number of assets discovered with default passwords.

Identify vulnerability targets: List of assets currently with default passwords.

Track remediation progress: Assets that have had default passwords for more than 30 days.

Assess provisioning issues: New assets discovered during the last 30 days with default passwords.

Take Action

Customizable alerts and reports provide notifications when a vulnerability is discovered, so your IT staff can act quickly and decisively to mitigate risks to your organization.

  • Send alert emails to administrative staff
  • Create a report of all unsecure devices
  • Integrate scan findings into the CMDB or “Risk Management” dashboards

Hackers know about the opportunities default passwords present to them and the risks they pose to their targets. Don’t fall prey to their malicious intent – take action today. 

Virima will help you understand your company’s risk exposure and provide you with the information you need to take action to keep your operations and data secure. 

Learn more about how to make the IT asset security circle unbreakable and why linking assets, configurations and change management is critical by downloading our whitepaper here.

To get started, contact us today to schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

Table of contentsWhat is CMDB, and why is it important for your cloud initiatives?CMDBs and change managementCMDBs and incident managementCMDBs and problem managementCompliance reporting made easy with CMDBsImpact analysis with CMDBs and cloud assetsMake better, fact-based decisions with Virima for…

Table of contentsHow does asset discovery work?What types of IT assets can you discover?NetworksServersPCs, laptops, and mobile devicesBenefits of IT asset discoveryLess time spent on cataloging IT assetsBetter and detailed IT reportsStreamlined IT asset acquisitionEnsuring compliance with security policies A single…

Table of contentsWhy stakeholder communications are importantHow to prepare for incident communicationIncident management best practicesCommunication plan High-quality major incident management communication plan Using visualizations in stakeholder communicationsIncident mitigation with visualizations Virima can help you with incident management Incidents are a part of business,…

Table of contentsAsset managementTracking and labeling assets’ locations and states through an asset register Tracking and managing software licenses Managing end-user devicesKeeping tabs and handling decommissioned assetsConfiguration managementIdentifying configuration items in the CMS Controlling  and managing all changes made to assets Understanding impact on…

Some people think that an IT service desk is the same thing as an IT help desk. It isn’t and we’re  going to explain the difference between service desk and help desk. Sure, there are some similarities, but there are…

Table of contentsA CMDB tool can maintain all other tools What is CMDB in ServiceNow?What are ServiceNow CMDB best practices?A few ServiceNow CMDB best practices include:Defining your goalsForming a configuration management teamEstablishing a governance structureUnderstanding configuration item designIntegrating with key business…

Table of contentsStep 1. Determine business objectivesStep 2. CMDB discovery toolsStep 3. ITSM system integrationStep 4. Equip data owners/data stewards with the right toolsStep 5. Data management and retention planStep 6. CMDB: data visualizationLearn more about these steps by watching…

Incident management is crucial while dealing with major incidents. They are the crises that have widespread impacts on your employees, disrupt your operations, and impact your ability to deliver on customer expectations.  While you may assume your company is prepared…

Table of contentsUnderstanding business service mappingA modern approach to business service dependency mappingDiscovery planning processUse casesVirima simplifies service mapping and IT discovery Business service mapping is the area of configuration management that perplexes so many IT professionals. Yet, it provides…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

IT asset management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Inventory management can exist without IT asset management, and in fact, it does in many organizations as it has been in existence…