Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 24 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Access All Areas?

by The Gurus
March 22, 2016
in News, This Week's Gurus
Share on FacebookShare on Twitter

Access All Areas? — Stuart Facey, VP EMEA at Bomgar discusses how the control and management of network access can combat data breaches
Last week, media regulator Ofcom confirmed that a major data breach[1] had occurred within its organisation.  Before leaving the company a former employee had downloaded as much as six years of data provided by TV broadcasters to the regulator.  The data was reportedly offered to the ex-staffer’s new employer, with the intention of giving an insight and competitive edge over its rivals.
The new employer contacted Ofcom to advise it of the situation, enabling Ofcom to react quickly. It sent letters to all licenced broadcasters, alongside a public statement, confirming that “the extent of the disclosure was limited and has been contained, and we have taken urgent steps to inform all parties.”
Unfortunately, these types of breaches are becoming increasingly frequent. Ofcom was extremely lucky that the company being offered this sensitive data was ethical enough to highlight the breach and not use the data for its own competitive advantage. It’s always hoped this would be the case, but not all companies are as honest. A key learning from this situation is the real need for companies of all sizes, and across public and private sectors, to prioritise the management and control of user access and accounts within their organisations. Unauthorised access or extraction of data or Intellectual Property (IP) is a real concern for anyone tasked with protecting and defending a company’s core assets. However, it is not always front of mind when security policies or solution implementations are being decided by the IT decision makers.
It has become critical for companies to ensure that only approved users – from internal employees to external vendors – can access certain areas of their company network, aligned with the correct levels of attributed trust determined by their role and responsibilities.  This ensures employees and third parties have easy access to information that is appropriate for their consumption, whilst giving others access – often on a task by task basis, or for a designated time period – to more business critical data, systems or IP.
By integrating privileged access management (PAM) solutions effectively across the organisation, companies can securely manage and control access to the right data, by the right people, at the right time.   This puts the control back into the hands of the CISO, IT r or network manager without effecting or limiting employees’ productivity or worker experience.
As well as providing much tighter controls, PAM solutions can also allow managers to monitor and act on sessions in real-time, review tamper-proof audit trails including annotated video recordings and detailed logs of screen sharing, file transfer and shell activity.  This insight can then be used to adjust privileged access settings, extending users’ access to include new areas of the network as a project evolves or as their remit changes.  The data can also be used as supporting information in the event of anyone trying to breach the agreed access settings, whether that be an internal threat, an approved third party or an unknown and unauthorised attempt to access the network.
Protecting a company’s most critical assets from cyber threats has never been more important. The ability for organisations to flexibly control and secure access rights, and in turn protect their critical IP and data, should be right up there as a key consideration.
[1] http://www.theguardian.com/media/2016/mar/10/ofcom-tackles-mass-data-breach-of-tv-company-information

FacebookTweetLinkedIn
Tags: access all areasAccess ManagementaccountsbomgarCISOControldata breachfilesInsider ThreatIntellectal PropertyIPNetworkOfcompasswordprivacyprivileged access managementProtectionsecuritytvuser access
ShareTweetShare
Previous Post

Most companies are over-exposed to cyberattacks – Varonis shows us why

Next Post

Hello from the outside, I hacked your email and stole your photos…

Recent News

call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023
Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information