BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

How to Use the Force to Secure Your Enterprise

Posted August 24, 2011    Peter McCalister

In the Star Wars Trilogy, there are two very clear sides of the moral spectrum. First, we have the rebel forces, keepers of the Force and warriors fighting against the evil Emperor. The Emperor, and the imperial forces that fight for him, are the evil masterminds who want to destroy the Force and the source of all goodness. While other battles may not seem quite as grand, there are parallels from Star Wars that apply to a multitude of other situations. One of these situations is the risk of insider threat in your organization. There are lessons to be learned from Darth Vader, the Emperor, Luke Skywalker, and others. Here are the three we like the best:

Use the Force
While you may not have the actual Force, you do have decision-making power. Decide now to secure your enterprise against the threat of insider data breachers. You don’t want to look back with regrets (like Vodafone had to). Use your force for good before it’s too late.

Call in Your Allies
Defeating the Empire wasn’t a job for just Luke Skywalker. Sure, he was the one chosen to lead the charge, but he had plenty of help from his friends, fellow fighter pilots, Ewoks, and a host of other political leaders working towards the same goal. The same goes for you in your company. You don’t have to do it alone. Use your dedicated team and even outside software vendors to make your IT infrastructure compliant and secure.

Beware of Human Nature
Every company in existence is subject to insider threat. Because human nature is so volatile and inconsistent, this fact will never change. The key is to set up a least privilege solution and implement rules to keep precious information secure from those who don’t absolutely need it. It’s not enough to simply trust people to remain loyal and do what you ask- look how that worked out for the Emperor. He trusted Darth Vader completely, but Vader ultimately threw him to his death! Even those we think will never betray us need least privilege.

Leave a Reply

Additional articles

PBPS-screenshot-blog aug2014

Failing the Security Basics: Backoff Point-of-Sale Malware

Posted August 22, 2014    Marc Maiffret

At the beginning of this month, US-CERT issued a security alert relating to a string of breaches that had been targeting Point of Sale (POS) systems. The alert details that attackers were leveraging brute forcing tools to target common remote desktop applications such as Microsoft’s Remote Desktop, Apple Remote Desktop, Splashtop and LogMeIn among others….

Tags:
, , , , , ,

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,