BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

How to Use the Force to Secure Your Enterprise

Posted August 24, 2011    Peter McCalister

In the Star Wars Trilogy, there are two very clear sides of the moral spectrum. First, we have the rebel forces, keepers of the Force and warriors fighting against the evil Emperor. The Emperor, and the imperial forces that fight for him, are the evil masterminds who want to destroy the Force and the source of all goodness. While other battles may not seem quite as grand, there are parallels from Star Wars that apply to a multitude of other situations. One of these situations is the risk of insider threat in your organization. There are lessons to be learned from Darth Vader, the Emperor, Luke Skywalker, and others. Here are the three we like the best:

Use the Force
While you may not have the actual Force, you do have decision-making power. Decide now to secure your enterprise against the threat of insider data breachers. You don’t want to look back with regrets (like Vodafone had to). Use your force for good before it’s too late.

Call in Your Allies
Defeating the Empire wasn’t a job for just Luke Skywalker. Sure, he was the one chosen to lead the charge, but he had plenty of help from his friends, fellow fighter pilots, Ewoks, and a host of other political leaders working towards the same goal. The same goes for you in your company. You don’t have to do it alone. Use your dedicated team and even outside software vendors to make your IT infrastructure compliant and secure.

Beware of Human Nature
Every company in existence is subject to insider threat. Because human nature is so volatile and inconsistent, this fact will never change. The key is to set up a least privilege solution and implement rules to keep precious information secure from those who don’t absolutely need it. It’s not enough to simply trust people to remain loyal and do what you ask- look how that worked out for the Emperor. He trusted Darth Vader completely, but Vader ultimately threw him to his death! Even those we think will never betray us need least privilege.

Leave a Reply

Additional articles

Cavalancia-Headshot - Medium

Making Windows Endpoints the Least of your Worries

Posted September 2, 2015    Nick Cavalancia

We’re all concerned that someday an external hacker will try to gain access to your company’s critical data and systems. The problem? Your endpoints – both your workstations and servers – bypass (and often leave) the safety and security of your environment daily.

Tags:
, ,
powerbroker-difference-2

Why Customers Choose PowerBroker: Low Total Cost of Ownership

Posted September 2, 2015    Scott Lang

In a survey of more than 100 customers, those customers indicated that BeyondTrust’s low powerbroker-difference-2total cost of ownership was a competitive differentiator versus other options in the privileged account management market.

Tags:
, , ,
Larry-Brock-CISO

Passwords: A Hacker’s Best Friend

Posted September 1, 2015    Larry Brock

After all the years of talk about biometrics and multi-factor authentication, we still have passwords and will likely have them for a long time. Because many “high risk” systems require complex passwords (zk7&@1c6), most people that use them believe their passwords are secure. But they aren’t.

Tags:
, ,