BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Administrative Privileges are Behind Many, but not all Breaches

Posted January 18, 2011    Peter McCalister

Ok – so even we admit not EVERY security breach is related to administrative privileges. We saw how horrible the passwords were of Gawker users; we know hackers exist too and there is a remaining 10% of critical Microsoft vulnerabilities that can’t be mitigated by removing admin rights. A recent reporton Virgin Media’s email recycling, which would allow a new email recipient to “retrieve a forgotten password” of the email’s previous owner could not be prevented with any measure related to administrate privileges.

But lets take a look at the last week:

  • IBM’s DeveloperWorks site recently had this replacing certain pages after hackers leveraged a vulnerability to gain access. Since it requires admin access to upload new web pages, it’s reasonable to suggest they used a vulnerability to gain administrative privileges. Could IBM have prevented it? The hacker-posted website seems to indicate as much.
  • Vodafone just suffered a breach somehow related to password sharing. You may think this is a password issue, but since the breach involved hundreds of customer accounts, which passwords do you think could grant access to hundreds of accounts? Yup – you got it – an admin’s password. Few other people have access to entire databases.
  • This one is particularly interesting, because it highlights that “Printers and copiers are often overlooked as a potential source of a data security breach but they need to be handled just as carefully as a PC.” Some printers keep copies of everything ever printed and employees tinker with their printer settings almost as often as their desktops. How many help desk inquiries do you get regarding printers?

Leave a Reply

Additional articles

Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,
webinar_ondemand

On Demand Webinar: Securing Windows Server with Security Compliance Manager

Posted May 14, 2015    BeyondTrust Software

On Demand Webinar: Security Expert Russell Smith, explains how to use Microsoft’s free Security Compliance Manager (SCM) tool to create and deploy your own security baselines, including user and computer authentication settings.

Tags:
, ,