BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Red Flags Are Not Enough to Thwart Insider Attacks

Posted August 30, 2011    Peter McCalister

KPMG recently released a report titled, “Who is the typical fraudster?,” indicating that companies were not seeing the red flags when it came to insider threats. According to KPMG’s analysis of 348 cases across 69 countries from 2008 to 2010 that they investigated on behalf of its clients, the typical “fraudster” is described as:

• A 36-45 year old male in a senior management role in the finance unit or in a finance-related function

• An employee for more than 10 years who usually would work in collusion with another individual

The report indicates that 56 percent of the frauds the KPMG member firms investigated “had exhibited one or more red flags that should have brought management attention to the issue, but only 10 percent of those cases had been acted upon prior to requiring a full investigation.”
Should companies be solely relying on red flags to protect their sensitive corporate data? KPMG suggests endorsing and supporting robust ethics and compliance policies and conducting vendor screening and background checks on new hires.
We at BeyondTrust believe insiders like Disgruntled Dave can be thwarted when an organization implements a least privilege environment to help secure their perimeter within. Whether we like it or not, people can do bad things intentionally, accidentally, or indirectly, and it is our responsibility to take measures to prevent this.

Leave a Reply

Additional articles

Cavalancia-Headshot - Medium

Making Windows Endpoints the Least of your Worries

Posted September 2, 2015    Nick Cavalancia

We’re all concerned that someday an external hacker will try to gain access to your company’s critical data and systems. The problem? Your endpoints – both your workstations and servers – bypass (and often leave) the safety and security of your environment daily.

Tags:
, ,
powerbroker-difference-2

Why Customers Choose PowerBroker: Low Total Cost of Ownership

Posted September 2, 2015    Scott Lang

In a survey of more than 100 customers, those customers indicated that BeyondTrust’s low powerbroker-difference-2total cost of ownership was a competitive differentiator versus other options in the privileged account management market.

Tags:
, , ,
Larry-Brock-CISO

Passwords: A Hacker’s Best Friend

Posted September 1, 2015    Larry Brock

After all the years of talk about biometrics and multi-factor authentication, we still have passwords and will likely have them for a long time. Because many “high risk” systems require complex passwords (zk7&@1c6), most people that use them believe their passwords are secure. But they aren’t.

Tags:
, ,