BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Identity Thief Irene Hijacks Customer Database At Travelodge

Posted August 15, 2011    Peter McCalister

I introduced you to Identity Thief Irene as an archetype for the type of insider villain who may already be infiltrating your extended enterprise a couple of weeks ago and guess what? Almost every day I see an article that represents “Irene” as manifesting in another company with some measurable harm that was newsworthy.

The latest set of articles I found refer to Travelodge UK who had the very embarrassing requirement to send out letters to their registered customer base apologizing for the recent bout of spam they were receiving because a critical database was hacked. The company’s twitter feed stated that they “had not sold customer records, meaning that the data breach was likely to have been the result of a cyber attack.”

TheInquirer.net reported that the letter, signed by Gary Parsons, the CEO of Travelodge said, “Our main priority is to ensure the security of our customers’ data, which is why I wanted to make you aware, that a small number of you may have received a spam email via the email address you have registered with us.”
“Please be assured, we have not sold any customer data and no financial information has been compromised.”

If you have anyone in your organization with excessive privileges (root on unix/linux servers or Admin on Windows desktops) then you run the risk of an outside hacker like “Irene” hijacking those credentials and gaining access to critical information assets. It is also important to have an in-place Database Activity Monitoring solution to log who is touching these assets and what they are doing in order to quickly remediate harm.

Leave a Reply

Additional articles

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,
PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,