BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

But Users Aren’t That Savvy….NOT!

Post by Peter McCalister February 2, 2012

BeyondTrust has been doing Privilege Management for over 25 years. I’ve been with the company for over six of them. I’m constantly talking with people about the benefits of running their enterprise users as standard users, rather than administrative ones. Admin users are able to circumvent Group Policy or other security measures, such as installing pirated software that puts the company on the hook for licensing costs or users stealing data from the enterprise with no trace of it happening.

Just this week I spoke with a company that was audited and flagged for lack of licensing due to pirated software. What I hear sometimes in return is, “Ya, but my users aren’t that savvy”. This is a company destined for some bad press.

Let me share with you a little story from my own life. Recently I was at home hanging out with my youngest daughter, she’s six. She started to fall asleep and I’m thinking, 1. What’s better than your kid snuggling up with ya, you parents know what I mean, and 2. Here’s my excuse to doze off myself, hey, it’s only fair.

A little while later when I woke up, I realized my daughter was already up and bounding around like usual. It wasn’t until later when I went to use my iPad I realized something was awry. I was missing icons. At first, before I connected the dots to what icons where missing, I was upset. But then I noticed a new folder had been created. What my daughter had done was create a folder, give it her name and methodically place the games she apparently considers hers into this folder.

I realize this is literally ‘Child’s Play’ to us, but if my six year old is already savvy enough to do that, is it really that much of a leap for older, more educated users with intent to cause damage to your environment? Having seen the results time after time, it is not.

Leave a Reply

Additional articles

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,
BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,