BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Nefarious and Angry Employees Still a Primary Threat to Organizations

Posted March 26, 2012    Peter McCalister

A new Ponemon study reports that the number of data breaches caused by malicious attacksincreased from 31 percent in 2010 to 37 percent in 2011, with malicious insiders being responsible for 33 percent of attacks. In the report Ponemon states, “We think about the evil hacker, which is pretty serious stuff, but in our study, we find that it’s really the malicious insider – someone who’s nefarious or angry at the organization – that presents the real danger to the company.”

The study also reports that 39 percent of data breaches in 2011 were caused by negligent insiders. When you combine the threats posed by malicious and negligent employees, organizations of all sizes have cause for concern.

The good news is there are steps that can be taken to secure the perimeter within:

• Implement privileged identity management policies to create boundaries that enable end users and applications to communicate freely within an IT environment without worry of intentional, accidental or indirect misuse of privilege
• Implement a least privilege strategy, granting users only standard rights, but permitting elevation of privileges as required to enable them to do their jobs effectively
• Secure and monitor passwords for the ability to track and log their use, while having visibility into the granular details about when someone logged in, the keystrokes they performed and the information they accessed

With the right combination of policies and strategies in place, organizations can mitigate the opportunity for an employee – whether malicious or negligent – to take a risky action in the first place.

Leave a Reply

Additional articles

randy franklin smith

At the End of Day You Can’t Control What Privileged Users Do: It’s about Detective/Deterrent Controls and Accountability

Posted March 31, 2015    Randy Franklin Smith

Live Webinar: Thursday, April 2, 2015 | 10am PT/1pm ET | REGISTER NOW! In this webinar, Security Expert Randy Franklin Smith will look at how to audit what admins do inside Linux and UNIX with sudo’s logging capabilities.

Tags:
, ,
BA_Hacked

British Airways Executive Club Member Accounts Hacked

Posted March 30, 2015    Brian Chappell

British Airways has released information regarding the hacking of a number of their Executive Club (BA’s frequent flyer programme) member’s accounts.

Tags:
, , ,
webinar_ondemand

On Demand Webinar – Why You Still Suck at Patching

Posted March 27, 2015    Lindsay Marsh

On Demand Webinar: Dave Shackleford recounts some of his personal experiences in patch management failure, and breaks down the most critical issues holding many teams back from patching more effectively.

Tags:
,