Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Verizon DBIR Reaffirms The Importance Of Privileged Account Management.

by The Gurus
May 22, 2019
in Guru's Picks
Verizon DBIR Reaffirms The Importance Of Privileged Account Management.
Share on FacebookShare on Twitter

By: Andrew Clarke, director of strategic alliances & channel partnerships, One Identity.

Within the VDBIR, one of the factors that continues to plague the public sector are breaches that use privileged credentials, either by misuse or by error – with that alone accounting for 30% of breaches. This arises due to uncontrolled and unmanaged privileged accounts – or the accounts required for critical administrative tasks. These are often performed by third parties and therefore become even more difficult for organisations to manage on their own. One such aspect that is re-enforced in the report is uncontrolled access to privilege/administrative accounts. When a hacker gets access to such an account, they can probe weaknesses and execute privilege commands that sow the seeds for continual intrusions, many that go undetected for months… or even years.

Furthermore, in the 2019 VDBIR, consideration is given to the principles that result in an organisation being hacked. Although perimeter defences still play a vital role in protecting an organisation, once inside, a malicious actor has scope to take advantage of any open doors. Everyone is aware that perimeter defences play an important role in deterring cybercriminals from targeting their domain, but by using a combination of tactics, threats and procedures (TTPs) as outlined in the VDBIR, when these are defeated, the cybercriminal is then able to take advantage of insufficient controls across the company network. Usually, privileged access is located and from there and the position is escalated, allowing them to map out the entire network and provide a route to extract data.

There have been many examples in the media in the past few years where this has been seen to be the underlying cause of high-profile enterprise attacks. This type of risk can be easily mitigated by the introduction of a privileged password safe – which protects access to the privileged account alongside privileged session management – that provides individual accountability for those that have legitimate access – but protects access to critical assets and systems.

The key security measure that stops this in its tracks is privileged access management – asserting control and management over the powerful administrative accounts that facilitate the access resulting in head-line making damage to business and reputation.

As undetected privilege misuse is a key factor that plays out time and time again, a crucial takeaway from the report is that once a privilege account has been compromised, it can be used repeatedly.

Another way organisations can get smarter with security is by implementing a layer of privileged account analytics within their business. Such technology enhances security by using behaviours and machine learning algorithms to detect known and unknown bad behaviour instead of pre-determined patterns which can only detect known bad behaviour. With this in place, the different behaviour displayed by a malicious actor will be detected and alerted – and a previously undetected attack vector is removed.

What this report makes abundantly clear is that privileged access management is a foundational security control that no one should overlook.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Gigamon Launches New Tool To Shine Light On Digital Apps Within the Enterprise.

Next Post

Cybersecurity Is A Market For Lemons.

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information