BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Insider Threat Or Stalker?

Posted January 24, 2012    Peter McCalister

We have talked about the various types of insider threats – accidental or malicious – at great length and here is a prime example of just how weird things can get when an employee decides to abuse privilege.

Juliah Kechil, a former healthcare assistant at Royal Liverpool university hospital has been fined and also ordered to pay a sum toward prosecution costs after she unlawfully accessed the medical records of five members of her ex-husband’s family in an effort to obtain their new telephone numbers. Now we could speculate about what went so wildly wrong that she was cut off from all forms of communication, and let’s be honest it could be fun to spin a tale, starting with out-of-hand fights and ending with the husband entering the witness protection program. The reality is probably much more boring, but the end result of her snooping through medical records for phone numbers is a complete abuse of privilege, and a little stalkerish.

The hospital was led to launch an investigation when the defendant’s former father-in-law contacted the hospital after receiving nuisance calls, which he suspected had been made by Kechil. Upon further investigation, the hospital learned she had no work related reason to access their records. The breaches were traced through audit trails linked to the defendant’s smartcard ID.

You can’t rely on your employees to always do the right thing, which is why having the right privilege access in place is critical.

Leave a Reply

Additional articles

normal-blog-img

New IT Security Best Practices for Maintaining “Business as Usual” Despite Evolving Threats

Posted August 13, 2014    Morey Haber

It’s time to get back to business. Here in the U.S., summer vacations are wrapping up and businesses are looking forward to closing out 2014. Over the past year, we’ve seen several incidents that warrant changes in the ways consumers make purchases and businesses conduct transactions. Consider last week’s theft of a whopping 1.2 billion…

Tags:
, , ,

Retina Vulnerability Audits – August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

The following is a list of Retina vulnerability audits for this August 2014 Patch Tuesday: MS14-043 - Vulnerability in Windows Media Center Could Allow Remote Code Execution (2978742) 34924 – Microsoft WMC Remote Code Execution (2978742) MS14-044 - Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) 34915 – Microsoft SQL Server Multiple Vulnerabilities (2984340) – 2008 34916 –…

patch-tuesday

August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

This August Microsoft has released nine security bulletins which account for a whole variety of critical vulnerabilities. The most critical bulletins are MS14-051 (Internet Explorer), MS14-045 (Kernel-mode), and MS14-049 (Windows Installer). MS14-043 fixes a critical code execution vulnerability within Windows Media Center (people still use that?). The vulnerability itself is specifically within a COM object…

Tags:
, , ,