BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Healthcare Data Breaches Thanks To Insiders

Posted January 10, 2012    Peter McCalister

A Ponemon Institute report published this month found that healthcare data breaches have risen 32 percent since 2010. Ninety-six percent of all healthcare providers say they have had at least one data breach in the last two years and that most of these were due to employee mistakes and sloppiness, while 46 percent of respondents cited third-party error, including business associates as the culprit.

Just this year we saw high-profile data breaches from Stanford Hospital, HealthNet and the University of Mississippi Medical Center, to name a few. All of these were the result of accidental misuse of employee privilege.

Many of these breaches likely could have been prevented if the right privilege identity management policies were in place, leading to less accidental or intentional misuse of privilege. Healthcare is something we all need, making us all potential victims of data breaches (and let’s face it, how many of us have actually already been victims), so it has never been more important for companies to take extra precautions to protect our data from insider threats.

As we look toward a new year, filled with healthy resolutions like getting in shape, eating more vegetables or getting more sleep, let’s not forget to make protecting sensitive data from accidental or intentional misuse a top priority.

Leave a Reply

Additional articles

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,
PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,