BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Stolen Fruit is the Sweetest (Especially for Hackers)

Post by Peter McCalister February 3, 2011

I’m sure you’ve heard the saying, “stolen fruit is the sweetest.” It’s a phrase that gets thrown around lightly, but it’s time to take it to heart. In a day when information and sensitive data are being stolen, manipulated, and blasted for the world to read, this is a saying we all need to look at twice. Hackers, inside security leakers, and thieves all agree: that which is stolen is the sweetest. You don’t want to find out how sweet the information in your enterprise will be to them. Steps should to be taken to secure the sensitive information and data in enterprises across the world.

Who are these people stealing the “fruit?” I think you can probably guess- hackers, thieves, and those abusing administrator rights. These are the people enterprises must protect against. According to a study performed by the Professional Association for SQL Server (PASS), 44% of database security challenges come in the form of inside hackers and the abuse of privileges. Outside hackers and thieves do present a threat to the integrity of our databases and the information therein, but our attention should first be turned to those already in our organizations. Often these individuals have too much access to information they simply do not need. And why do they steal this data? Because your data is truly sweet to them- they see a huge payday without the hard, bitter work. If you think this doesn’t apply to you, or that none of your employees are capable of such atrocity, let me turn your attention to the Goldman Sachs debacle. I bet they thought their enterprise wasn’t in danger either- yet look at what transpired. How much will the “sweetest fruit” cost your company?

If you are concerned about the security of your enterprise (you should be if you haven’t already taken measures to keep your sensitive information safe), it’s time to implement a privilege management policy and become compliant with government mandates. It’s the only way to prevent the fruits of your company from becoming sweet and stolen. Don’t let your employees assign a price to the sweet information in your enterprise. Set up a protocol that allows users just the right amount of access to information.

Leave a Reply

Additional articles

insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,