Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Privilege gone wild! Our latest survey finds privileged users are out of control.

Posted October 22, 2013    Sarah Lieber

Did you know that 40% of employees have unnecessary access rights? What about that over 25% of employees admitted to having retrieved information not relevant to their job like financial, reports, salary info, HR and personnel docs? Now have I caught your attention?

As our latest security survey proves, insider threats continue to be a serious threat vector for organizations. Employees are being granted excessive privileges and access for their particular roles and it’s resulting in unnecessary risks to organizations across the globe. These findings further set in stone just how important it is to deploy proper identity and privilege management within your organization. “The insider threat has always been a vulnerability we take very seriously at BeyondTrust and it’s our goal to help customers combat this growing problem,” explains Brad Hibbert, EVP of Product Strategy at BeyondTrust. Read the full press release here.

Additional key survey takeaways:

  • 44 percent of employees have access rights that are not necessary to their current role
  • 80 percent of respondents believe that it’s at least somewhat likely that employees access sensitive or confidential data out of curiosity
  • Over three-quarters of respondents say the risk to their organization caused by the insecurity of privileged users will increase over the next few years
  • Customer information is considered most likely at risk if there’s a lack of proper access controls over privileged users

Privilege Gone Wild

The survey reflects responses from 265 IT decision makers including security managers, and network and systems engineers across a number of industries including financial services, manufacturing, and government, among others.

BeyondTrust’s PowerBroker solutions help balance the requirements of users, with those of security and compliance teams, for Linux, Unix and Windows environments. Learn more about PowerBroker for Windows here.

, , , , , , , , , , , , ,

Leave a Reply

Additional articles


Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.