BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Administrative Privileges are Behind Many, but not all Breaches

Posted January 18, 2011    Peter McCalister

Ok – so even we admit not EVERY security breach is related to administrative privileges. We saw how horrible the passwords were of Gawker users; we know hackers exist too and there is a remaining 10% of critical Microsoft vulnerabilities that can’t be mitigated by removing admin rights. A recent reporton Virgin Media’s email recycling, which would allow a new email recipient to “retrieve a forgotten password” of the email’s previous owner could not be prevented with any measure related to administrate privileges.

But lets take a look at the last week:

  • IBM’s DeveloperWorks site recently had this replacing certain pages after hackers leveraged a vulnerability to gain access. Since it requires admin access to upload new web pages, it’s reasonable to suggest they used a vulnerability to gain administrative privileges. Could IBM have prevented it? The hacker-posted website seems to indicate as much.
  • Vodafone just suffered a breach somehow related to password sharing. You may think this is a password issue, but since the breach involved hundreds of customer accounts, which passwords do you think could grant access to hundreds of accounts? Yup – you got it – an admin’s password. Few other people have access to entire databases.
  • This one is particularly interesting, because it highlights that “Printers and copiers are often overlooked as a potential source of a data security breach but they need to be handled just as carefully as a PC.” Some printers keep copies of everything ever printed and employees tinker with their printer settings almost as often as their desktops. How many help desk inquiries do you get regarding printers?

Leave a Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,