BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Confessions of a Paranoid IT Director

Posted April 6, 2011    Peter McCalister

Hi, my name is Betty, I’m an IT Director at a large utility company and it’s been 1 week since my VP of Software Development complained that security was locked down too tight to get anything done. (All together now) HI BETTY!

I know this is a support group for IT Directors suffering from governance, risk and compliance issues, but candidly I don’t acknowledge that I, or my organization, has a problem.  I’ve locked down every network, server, desktop, cloud and virtual environment so tightly that it takes a call to the help desk anytime someone needs admin rights to do anything.  Sure, our help desk costs skyrocketed, but this way I have complete control over who does what to our IT systems and can guarantee security to my boss.

The other problem that I have to ignore frequently is the VP of the Software Development organization who is constant complaining that his team can’t get anything done and will be missing their deadlines because of my security policies.  He is now threatening to break into our data center and reprogram all security policies one night, so I am evaluating new physical security measures as well.

I recently saw an ad for Guido the Gorilla who is trained to protect IT assets the old fashioned way…with intimidation and brute force.  Do you think he will be worth the investment or not worth his weight in bananas?

Leave a Reply

Additional articles

pbps-blog2

8 Reasons Your Privileged Password Management Solution Will Fail

Posted September 18, 2014    Chris Burd

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organization. But if passwords are such a no-brainer, why do two out of three data breaches tie back to poor password management? The fact is that not all privileged password management strategies are created equal, so it’s critical…

Tags:
, , , , , ,
pbps-customer-campaign-image

You Change Your Oil Regularly; Why Not Your Passwords?

Posted September 11, 2014    Chris Burd

There are many things in life that get changed regularly:  your car oil, toothbrush and hopefully, your bed sheets.  It’s rare that you give these things much thought – even when you forget to change them. But what if you’re forgetting something that can cost you millions of dollars if left unchanged for long periods…

Tags:
, , ,

On-Demand Webcast: The Little JPEG that Could (Hack Your Organization) with Marcus Murray

Posted September 10, 2014    Chris Burd

IT security has come a long way, but every once in a while you see something that makes you think otherwise. Every day, internal and external hackers breach and traverse “secure” environments, making you wonder just how easy it is for attackers to completely compromise your network. In a new on-demand BeyondTrust webcast, Marcus Murray,…

Tags:
, , , , ,