BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Man Who Sold The World

Posted March 2, 2011    Peter McCalister

Depending on your generation (read “age”), you either know this as a classic David Bowie song and album (yes, vinyl did exist once) or an incrediblesong by Nirvana during their MTV Unplugged performance.  Since I’m on a classic rock roll (pun intended) and just saw yet another article on an insider selling corporate assets, I thought I should write a bit more about the temptations of the “over privileged”.

Yep, it’s true: power corrupts and absolute power corrupts absolutely.  That may be a bit cynical, but should you really trust your corporate IT assets to just any employee who could potentially decide either on their own or with the help of your competitor, to copy, damage or delete your data for fun and profit?

This is not as uncommon as you may think.  According to the 2010 Data Breach Investigation Report by Verizon with the US Secret Service:

  1.  48% of all data breaches were caused by insiders, this is up 26% from 2009
  2. 48% also involved privilege misuse, and
  3. 98% of all data breaches came from servers

We have also reported extensively on examples ranging from Mozilla to Vodaphone. Linux.com published the Top Five Insider Attacks of the Decade and if that isn’t enough to scare you into implementing a privilege identity managment solution, eliminate admin rightsfrom desktops, servers, virtual and cloud environments and establish “least privilege” enterprise-wide, then nothing will.

Leave a Reply

Additional articles

PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,
PowerBroker for Windows can be configured to automatically identify the end user’s language preference

Implementing Least Privilege Around the World with PowerBroker for Windows

Posted July 17, 2014    Morey Haber

BeyondTrust recognizes that international, multilingual businesses have unique operating challenges, especially when it comes to implementing enterprise software. PowerBroker for Windows is a least-privilege solution often deployed across thousands of systems spanning multiple geographies and protecting users of diverse backgrounds. Earlier this year, PowerBroker for Windows introduces new data privacy features for EMEA and APAC,…

Tags:
, ,