BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The New Twist On Insider Threats

Posted September 6, 2011    Peter McCalister

Just when an insider breach couldn’t be any worse for all parties involved – the data has been compromised, customers are upset, the company is embarrassed, it’s a lose-lose for everyone – the Financial Industry Regulatory Authority (FINRA) steps in with a new twist. A fine.

Recently, an employee of Citigroup managed to steal almost $750,000 from 22 customers during the course of eight years, leading FINRA to step in and fine Citigroup $500,000 for failing to keep track of this malicious employee.

What this tells us is that yes, companies need more thorough continuous monitoring practices and need to think more critically about how existing implementations of database activity monitoring (DAM) tools can be better utilized to track user behavior. They also need to improve the way that DAM tools are linked to identity management tools, leading to better tracking of user behavior across systems. But at the end of the day, the real lesson to be learned here is that in order to effectively fight the war against insider threats, IT must be backed by supervisory control.

There isn’t a simple solution to the problem of insider threats, but starting with the right database activity monitoring and privileged identity management policies is a good jumping off point for companies looking to avoid the hassle, the humiliation and now, the fines associated with insider threats.

Leave a Reply

Additional articles

dave-shackleford-headshot

Why You Still Suck at Patching…and How to Turn Your Life Around

Posted March 25, 2015    Dave Shackleford

Live webinar | March 26, 2015 | 10am PT/1pm ET | Dave Shackleford, SANS Instructor | Why You Still Suck at Patching…and How to Turn Your Life Around

Tags:
, ,
infographic

Privilege Gone Wild 2: Over 25% of Organizations Have No Privileged Access Controls

Posted March 24, 2015    Scott Lang

BeyondTrust recently conducted a survey, with over 700 respondents, to explore how organizations view the risk of misuse from privileged account misuse, as well as trends in addressing and mitigating those risks.

Tags:
,
webinar_ondemand

On Demand Webinar – A Security Expert’s Guide: The Windows Events You Should be Tracking and Why

Posted March 23, 2015    Lindsay Marsh

On-Demand Webinar – Windows Security Expert and MCSE, Russell Smith, discusses the Windows Events you should be tracking right now and why. He will also show you how to set up Event Log subscriptions so you have better monitoring across your Windows environments.

Tags:
, ,