BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Privilege gone wild! Our latest survey finds privileged users are out of control.

Posted October 22, 2013    Sarah Lieber

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention?

As our latest security survey proves, insider threats continue to be a serious threat vector for organizations. Employees are being granted excessive privileges and access for their particular roles and it’s resulting in unnecessary risks to organizations across the globe. These findings further set in stone just how important it is to deploy proper identity and privilege management within your organization. “The insider threat has always been a vulnerability we take very seriously at BeyondTrust and it’s our goal to help customers combat this growing problem,” explains Brad Hibbert, EVP of Product Strategy at BeyondTrust. Read the full press release here.

Additional key survey takeaways:

  • 44 percent of employees have access rights that are not necessary to their current role
  • 80 percent of respondents believe that it’s at least somewhat likely that employees access sensitive or confidential data out of curiosity
  • Over three-quarters of respondents say the risk to their organization caused by the insecurity of privileged users will increase over the next few years
  • Customer information is considered most likely at risk if there’s a lack of proper access controls over privileged users

Privilege Gone Wild

The survey reflects responses from 265 IT decision makers including security managers, and network and systems engineers across a number of industries including financial services, manufacturing, and government, among others.

BeyondTrust’s PowerBroker solutions help balance the requirements of users, with those of security and compliance teams, for Linux, Unix and Windows environments. Learn more about PowerBroker for Windows here.

Tags:
, , , , , , , , , ,

Leave a Reply

Additional articles

pbps-blog2

8 Reasons Your Privileged Password Management Solution Will Fail

Posted September 18, 2014    Chris Burd

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organization. But if passwords are such a no-brainer, why do two out of three data breaches tie back to poor password management? The fact is that not all privileged password management strategies are created equal, so it’s critical…

Tags:
, , , , , ,
pbps-customer-campaign-image

You Change Your Oil Regularly; Why Not Your Passwords?

Posted September 11, 2014    Chris Burd

There are many things in life that get changed regularly:  your car oil, toothbrush and hopefully, your bed sheets.  It’s rare that you give these things much thought – even when you forget to change them. But what if you’re forgetting something that can cost you millions of dollars if left unchanged for long periods…

Tags:
, , ,

On-Demand Webcast: The Little JPEG that Could (Hack Your Organization) with Marcus Murray

Posted September 10, 2014    Chris Burd

IT security has come a long way, but every once in a while you see something that makes you think otherwise. Every day, internal and external hackers breach and traverse “secure” environments, making you wonder just how easy it is for attackers to completely compromise your network. In a new on-demand BeyondTrust webcast, Marcus Murray,…

Tags:
, , , , ,