BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

4 Bad Habits to Kick for IT Security

Post by Peter McCalister March 15, 2011

Isn’t it amazing how easy it is to adopt bad habits? The crazy thing is that no one is immune- they plague each and every one of us. Whether we were taught incorrect practices or are just looking for shortcuts to make our lives/jobs/situations easier, each of us yields to poor patterns at some point in our lives.

It’s when we allow these habits to interfere with the mechanisms keeping our enterprises safe that they become a huge problem. Maybe you think your actions won’t matter because no one knows about them, or that your exploits won’t affect the sensitive information within your company’s database, or maybe it’s just that you’re not concerned enough to switch to correct principles. Whatever your reason for allowing bad habits to fester, it’s time for a wake-up call! There’s no room for these patterns in today’s information security world. With cases like theGoldman Sachs debacle and the Vodafone incident showing how prevalent data leaks and cyber crime are becoming, it’s time to shape up. But how can you take your bad habits and turn them into peace of mind? Start by kicking these four bad behaviors and you’ll be well on your way:

1. Stop allowing your employees access to root. With this type of access, your people can access everything, including the privileges required to manipulate and share data.

2. Don’t let desktop users run as administrators. When you allow your users to run as a local admin, you are opening your enterprise to serious security issues. You may think you’re saving money by allowing this instead of multiple calls to the help desk, but in reality you’re risking much more than money.

3. Stop bypassing logging. Without this system of checks and balances, you won’t be able to granularly control what goes on in your company.

4. Don’t assume that because you’re using UAC you’re immune to data breaches. UAC is a great tool, but doesn’t fully eliminate admin rightshttp://www.beyondtrust.com/. It leaves gaping holes in your protection plan.

If you find yourself on the path to a security breach because you’re choosing to maintain bad security habits, make the decision to change today. Kick these habits and introduce peace of mind into your security plan.

Leave a Reply

Additional articles

BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,

Heartbleed – When OpenSSL Breaks Your Heart

You’ve likely heard about the recent OpenSSL vulnerability, CVE-2014-0160, dubbed Heartbleed. The main takeaway of this vulnerability is that attackers can use this to obtain things like secret keys used for X.509 certificates, user names and passwords, instant messages, emails, and other highly sensitive information. For a technical analysis of the bug, check out this…

Post by BeyondTrust Research Team April 8, 2014
Tags:
, , ,