BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Insider Threats Aren’t Perpetrated By The Obvious: Part 2

Posted June 9, 2011    Peter McCalister

Insider threats are a global phenomenon. Every company in every part of the world is subject to some level of insider threat. And guess what? Insider villains are just as unidentifiable in the UK as they are in the US. They appear just as innocuous in Poughkeepsie as they do in Perth.

If you have employees with excessive privileges or access to sensitive data then they are at risk of intentionally, accidentally or indirectly misusing that privilege and potentially stealing, deleting or modifying the data.

I have reported on several cases in this blog over the last year where an insider has done everything from almost nuisance-level harm to the very heights of catastrophic theft in the hundreds of millions of dollars range. I also travel frequently to visit resellers, customers and prospects around the globe to discuss least privilege for specific business, geographic and system level requirement (physical, virtual, cloud-based computing platforms). What always amazes me on these trips is the general belief that insider threats is solely a US-based issue and that employees are completely trustworthy everywhere else.

Nothing could be further from the truth. Just recently an article in computing.co.uk reported that “ICO fines former Direct Assist employee for illegally obtaining NHS data.” I wonder if this guy looked like Mr. Burns from the Simpsons? Probably not, but he did get away with patient records which he then used to try and get those people to file personal claims. Just another story to add to the litany of insider threat damages.

Leave a Reply

Additional articles

Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,
webinar_ondemand

On Demand Webinar: Securing Windows Server with Security Compliance Manager

Posted May 14, 2015    BeyondTrust Software

On Demand Webinar: Security Expert Russell Smith, explains how to use Microsoft’s free Security Compliance Manager (SCM) tool to create and deploy your own security baselines, including user and computer authentication settings.

Tags:
, ,