BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Nefarious and Angry Employees Still a Primary Threat to Organizations

Posted March 26, 2012    Peter McCalister

A new Ponemon study reports that the number of data breaches caused by malicious attacksincreased from 31 percent in 2010 to 37 percent in 2011, with malicious insiders being responsible for 33 percent of attacks. In the report Ponemon states, “We think about the evil hacker, which is pretty serious stuff, but in our study, we find that it’s really the malicious insider – someone who’s nefarious or angry at the organization – that presents the real danger to the company.”

The study also reports that 39 percent of data breaches in 2011 were caused by negligent insiders. When you combine the threats posed by malicious and negligent employees, organizations of all sizes have cause for concern.

The good news is there are steps that can be taken to secure the perimeter within:

• Implement privileged identity management policies to create boundaries that enable end users and applications to communicate freely within an IT environment without worry of intentional, accidental or indirect misuse of privilege
• Implement a least privilege strategy, granting users only standard rights, but permitting elevation of privileges as required to enable them to do their jobs effectively
• Secure and monitor passwords for the ability to track and log their use, while having visibility into the granular details about when someone logged in, the keystrokes they performed and the information they accessed

With the right combination of policies and strategies in place, organizations can mitigate the opportunity for an employee – whether malicious or negligent – to take a risky action in the first place.

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,