• Idle infrastructure might cause your next breach heres how to st

    From TechnologyDaily@1337:1/100 to All on Sun Jan 11 09:15:08 2026
    Idle infrastructure might cause your next breach heres how to stop it

    Date:
    Sun, 11 Jan 2026 09:00:00 +0000

    Description:
    What CISOs can do to secure inactive systems and overlooked storage before attackers exploit them.

    FULL STORY ======================================================================

    Attacks on digital infrastructure are high on the worry list for CISOs in every sector. They hit retail giants like M&S, car manufacturers like Jaguar Land Rover, hospitals and even nurseries. Reports of serious cyber incidents seem to land with uncomfortable regularity, rising by 50% in the past year.

    Theres plenty of talk about the risks businesses face, usually focused on AI -driven malware, zero-days, and the latest attack techniques threats theyre constantly trying to keep up with. But the more uncomfortable truth is that attackers are also exploiting what organizations arent doing at all.

    Many environments still run with thousands of accounts whose passwords never expire, and inactive ghost user accounts that are still enabled a classic case of configure-once, forget-forever access. In parallel, theres a physical blind spot: USB sticks, external drives and microSD cards stuffed with sensitive data.

    They might be rarely used but perfectly readable and easily abused if theyre picked up by the wrong person.

    The old proverb idleness rusts the mind doesnt have to apply to data though new secure storage is designed to harden when its idle, turning inactivity from a weakness into part of your defense. How idleness turns into breaches

    Cybercriminals rarely break in with a single dramatic move. They work in phases, and an idle entry points make the first one almost effortless.

    It can start with access that shouldnt still be valid: a contractor account that was never revoked, a legacy service account with a non-expiring credential, or a temporary admin exception that outlived the project it was created for. From there, attackers can act like a normal user would, which is exactly why its so hard to spot them early.

    The same pattern shows up with physical storage. Companies are notoriously
    bad at copying sensitive files onto devices laptops , external drives, USB sticks, microSD cards without considering the security implications.

    Think of the unencrypted USB left on a train, the hard drive in the stolen bag, the memory card still in an unretrievable crashed drone, or the portable drive thats moved from desk to drawer to box over several years. The hardware goes missing, staff move on, and yet the data is still sitting there,
    readable to anyone who finds it.

    The end result may be anything from a quiet data leak that only surfaces months later to direct extortion. The usability vs security trade-off (and
    how it gets weaponized)

    Most organizations dont end up vulnerable because they dont care. They get there because friction is costly. Credentials dont change because rotating them once caused downtime. Access stays broad because nobody wants constant tickets and blockers.

    Files get copied to USBs and SD cards because the quickest way to move data usually wins.

    Yes, those choices make operations smoother, but they also smooth the path
    for attackers. The same easy processes your teams rely on day-to-day, plus
    any unsecure device holding sensitive data, are exactly what an attacker uses to get in and reach high-value systems.

    Another issue is that security efforts tend to follow whats visible. Data in transit is easier to standardize and show progress on: encrypt the
    connection, harden remote access, monitor sessions.

    Data at rest is where governance gets patchy: not just in years of shared drives, cloud buckets and legacy network storage, but also in the hardware people use to move data around. Laptops, USB sticks and SD cards fall outside the networks safety net: carried between sites, misplaced and perhaps not
    even encrypted.

    This sprawl turns into an obvious risk: too many places to store sensitive data, too many access paths, too few consistent rules to keep it safe.

    The answer isnt making systems painful to use. Its designing defaults that dont rely on constant manual upkeep and using smart hardware. What companies can do now

    The first step is simple: work out whats still enabled that nobody actively owns and what devices hold valuable data before a malicious actor does.

    Look for accounts that havent authenticated in months but remain enabled, passwords set to never expire, and service accounts that still have broad permissions because changing them once caused downtime.

    Do the same for infrastructure: review legacy systems that are not used but still connected to identity, network, or storage and either isolate, decommission or properly secure them with updated authentication, tighter permissions and encryption.

    Next, shrink the blast radius. Separate critical workflow functions, and
    limit what standard admin accounts and endpoints can even see, let alone access. Similarly, treat idle data as a lifecycle decision. If it isnt used, archive it securely with tight access controls or retire it.

    Leaving sensitive data somewhere on a share is how forgotten files become expensive incidents.

    And finally, dont ignore the physical layer of resilience. Offline and removable storage must be part of your resilience plan, and it has to survive theft, tampering, heat, moisture and mishandling and still enforce security when its not plugged in.

    Thats where hardened, secure-by-default storage makes the difference: its designed to stay locked down while idle, so offline doesnt become
    unprotected.

    Features like built-in hardware encryption , authentication at the point of access and tamper evidence help ensure a recovery copy stays both secure and usable under pressure, even when the rest of the environment cant be trusted.

    For example, if an attacker obtains admin credentials and later gets access
    to a backup device or media, encryption plus access-time authentication can stop that from turning into a full system compromise.

    Cybercrime thrives on what organizations neglect. The fix is to treat
    idleness as part of your defense strategy and not a forgotten doorway.

    We've featured the best private browser.

    This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro



    ======================================================================
    Link to news story: https://www.techradar.com/pro/idle-infrastructure-might-cause-your-next-breach -heres-how-to-stop-it


    --- Mystic BBS v1.12 A49 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)