Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 28 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Privileged user abuse predicted to increase in next 2 years

by The Gurus
May 20, 2014
in Editor's News
Share on FacebookShare on Twitter

Almost 90 per cent of businesses believe that the threat of privileged users will increase in the next two years.
 
According to a Ponemon Institute report, 88 per cent of 693 respondents believed that the risk of privileged user abuse will increase or stay the same in the next 12-24 months, while 69 per cent of respondents do not believe their organisations have the ability to identify an insider threat before it’s too late.
 
Jack Harrington, vice president of cyber security and special missions at Raytheon Intelligence Information and Services, said: “While the problem is acutely understood, the solutions are not. Even a well-intentioned, seasoned, privileged user with wide access to a network poses great risks because they are high-value targets to corporate ‘hacktivists’ and persistent adversaries eager to penetrate a company’s defences.”
 
While 88 per cent of those surveyed recognised that enhanced security was a top priority, only 40 per cent had a dedicated budget to invest in enabling technologies to reduce insider threat.
 
Commenting, Matt Middleton-Leal, regional director for UK and Ireland at CyberArk, acknowledged that privileged accounts and credentials had been found to be the attack vector in a number of high-profile breaches in recent years.
 
“However, despite the increased awareness of the risks posed by insiders, many organisations are clearly still confused by the threat,” he said. “While Edward Snowden was a classic example of a ‘rogue insider’, the accidental or careless misuse of privileged rights can also spell disaster for a business. Added to which, the enormous power that these credentials grant has not gone unnoticed by today’s cyber criminals, who now routinely seek to take control of these accounts in order to infiltrate a target system, either to steal valuable information or to imbed malware for use at a later date.
 
“Privileged accounts clearly present vast and multiple vulnerabilities and must be proactively addressed within all organisations. The days of perimeter security are long gone and security strategies must now focus on locking down access to the heart of the enterprise.”
 
Doug Mow, CMO of Courion, said: “A disgruntled employee will leave with access credentials and statistics show that there is an average of seven rotations in one company, so privileged access is rarely changed.”
 
Mow said that the issue for identity and access management is it that destroys the secure perimeter, as users with enhanced access can bypass controls.

FacebookTweetLinkedIn
Tags: Access ManagementIAMPrivileged
ShareTweetShare
Previous Post

US charges Chinese nationals with hacking

Next Post

IT professionals believe passwords make them vulnerable

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information