BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Large Pepperoni Pizza With A Side Of Least Privilege

Post by Peter McCalister September 7, 2011

One of America’s favorite food is pizza and for the household where both parents work, it’s also a favored “take out” salvation for the family dinner. Correspondingly, the average neighborhood pizza parlor can become a prime target for identity and credit card theft.

This was the case when a Pizza franchise named Mountain Mike’s outside of Sacramento was named the source of rampant ATM and credit card fraud. The headline reads: “Sheriff’s Detectives Find Major Source Of ATM/Credit Card Fraud” and the article goes on to say that “malicious software” was installed on the store’s point of sales systems that captured card and identity information and passed it along to the criminals.

In the past we’ve talked about Identity Thief Irene and how she is the archetype for a criminal who will use your “over privileged” account access rights to secure and steal what appears to be secure point of sale transactions. We have also blogged why POS Should Give A DAM to highlight why your point of sale transactions without Database Activity Monitoring can be at risk for identity theft and compliance audit failures.

If the owners of Mountain Mike’s had implemented a DAM or least privilege solution, then the more than 70 customers who fell prey to their local version of Identity Thief Irene would not have to be dealing with the aftermath of fraud.

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,