Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Time Is Of The Essence When Implementing Security Best Practices

Posted October 18, 2011    Peter McCalister

Six years ago the U.S. Government Accountability Office (GAO) criticized the IRS for lax security practices. Now it would seem that six years is plenty of time to get the right security policies in place, but while the IRS is showing progress, it has yet to remediate 65 of the 88 previously reported weaknesses – and now the most recent GAO audit has turned up 37 new weaknesses to add to the list. This news affects every tax-paying citizen in the U.S., as all of our information is at risk, and it’s a good example of why every organization needs to be paying attention to their own security policies.

It was reported that many of these security deficiencies are related to access control, configuration management and segregation of duties. Every day that employee responsibilities are not clearly defined and the right least privilege policies are not in place, the IRS, is putting their sensitive information – OUR sensitive information – at risk. Security weaknesses in these critical areas increase the risk of insider threats, both accidental and intentional.

Six years is way too long to know there are gaping holes in your security without taking steps to fix the problems. There isn’t time to waste, as every day that goes by without a security breach is just dumb luck. Organizations, including the IRS, need to take action now to implement comprehensive security plans, starting by getting least privilege and segregation-of-duty policies in place right away.

Leave a Reply

Additional articles

3d image Data Breach issues concept word cloud background

Experian/T-Mobile Data Breach: When 2 Days is not Enough

Posted October 2, 2015    Morey Haber

On October 1, Experian admitted full responsibility for the loss of T-Mobile customer data. 15 million user records dating back to 2013 were effected in the breach, with data including sensitive information that may be decryptable like social security numbers and drivers licenses.


Who Moved My Front Door? (What is Privileged Account Management?)

Posted October 1, 2015    Nigel Hedges

Not too long ago, I was sitting in a room with a very fluffy sales guy. In between words such as “we’ll make this happen” and “leave it with me, I’ll get it sorted” he asked the question “What is Privileged Account Management”?


Why Customers Choose PowerBroker: End-to-End Coverage

Posted September 30, 2015    Scott Lang

In a survey of more than 100 customers, those customers indicated that BeyondTrust’s end to end privileged account management capabilities were a competitive differentiator versus other options in the privileged account management market.