BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Just One Open Server Is Enough For Misuse Of Privilege

Posted January 30, 2012    Peter McCalister

Gambling on the odds may be fine for a weekend in Las Vegas, but do you really want to take that same risk with your precious corporate information assets? Zappos learned the hard way what happens when even one server is at risk from a security perspective.

A recent Dark Reading articled entitled “Zappos Dealing With Data Breach” reported on the recent need for the online shoe and clothing retailer (owned by Amazon) to email its 24 million customers with a notification of an internal breach. The article goes on to quote Zappos CEO, Tony Hsieh: “We were recently the victim of a cyberattack by a criminal who gained access to parts of our internal network and systems through one of our servers in Kentucky. We are cooperating with law enforcement to undergo an exhaustive investigation.”

I recently read Mr. Hsieh’s excellent book Delivering Happines and was thoroughly impressed with his attention to corporate culture and customer service. His 10 core values can be an inspiration for every company looking to differentiate itself in this hyper-competitive global economy. The challenge that needs to be highlighted in this story is that all it ever takes in a single server with full admin rights available for someone to abuse that privilege and gain unauthorized access to sensitive information.

Implementing a least privilege solution across every server (physical, virtual and cloud-based) is a great first step in preventing this type of embarrassment from happening to you.

Leave a Reply

Additional articles

skeletonkey3_713678_713680

Stopping the Skeleton Key Trojan

Posted June 29, 2015    Robert Auch

Earlier this year Dell’s SecureWorks published an analysis of a malware they named “Skeleton Key”. This malware bypasses authentication for Active Directory users who have single-factor (password only) authentication. The “Skeleton Key” attack as documented by the SecureWorks CTU relies on several critical parts.

Tags:
, , , , ,
webinar 2

On Demand Webinar: 10 Steps to Building an Effective Vulnerability Management Program

Posted June 26, 2015    BeyondTrust Software

In this on demand webinar, Cybersecurity Expert, Derek A.Smith will take you through his 10 steps for a successful vulnerability management program and how to get started now.

Tags:
, ,
AHHA_PRO.LOGO

Privileged Account Management – Another AH-HA in Cyber Security

Posted June 25, 2015    Nigel Hedges

I strongly believe that the Top 4 mitigation strategies don’t just simply apply to Australian organizations, it should be a global realization, a worldwide “ah ha!” for those still not quite understanding the importance here. Here’s a refresher (or intro) on the Top 4 mitigation strategies. Read on…

Tags:
, ,