BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Hacker Popularity Overshadows Insider Attacks

Posted August 2, 2011    Peter McCalister

Anonymous and LulzSec attacks have been making a splash across news headlines this summer. It should come as no surprise that hacker attacks are far more publicized than insider attacks. In fact, according to the 2011 CyberSecurity Watch Survey conducted by CSO Magazine and Deloitte, 70 percent of insider incidents are handled internally without legal action.

This begs the question – how many of those incidents are disclosed to the public? While a majority of U.S. states have enacted security breach notification laws it hasn’t stopped some organizations from covering up insider breaches.

Security breach notification, whether from a hacker or an inside attack, doesn’t just fall on private organizations. The California Department of Public Health took 80 days to disclose that an employee was improperly copying information over a period of fours years to a private hard drive. And just last week the Treasury Inspector General for Administration released a report indicating that the IRS averages 86 days to report issues where personal information has been compromised.

Currently legislation is making its way through the House of Representatives, aptly titled, Secure and Fortify Electronics (SAFE) Data Act, that if enacted would preempt state data breach disclosure laws and require companies to notify the FTC and affected individuals within 48 hours.

Although many businesses focus much of their security technology budgets toward protecting themselves against breaches from outsiders, it’s also as critical that they implement privileged identity management solutions to securing their perimeters within from insider threats.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,