BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

What Hackers Don’t Want You To Know About User Privileges

Posted March 9, 2011    Peter McCalister

Believe it or there are people out there that aspire to be hackers.  Not just the run of the mill, crack a password or two, but a bona fide Neo who can play with your secure data like a personal version of the matrix.

These would be data pirates and malcontents have websites that teach them their craft and even annual conferences like DEFCON to compare tips, tricks and vulnerabilities.  They are more organized than the average business executive or auditor realizes and they are inspired by nothing short of total access to any and everything on the information super highway, especially what is hidden within your  servers and on any one of your user’s desktops.

The recurring theme and core principal is basically to find access to admin credentials and you own the keys to the kingdom.  So, when users are granted excessive privileges (admin on desktops, root on servers) then you have an environment just begging for a hacker to attack.

Patient to Doctor: Doctor, doctor, when I do this it hurts

Doctor to Patient: Then don’t do it!

Sage advice that hackers don’t want you to know: if you don’t grant admin rights, you don’t run the risk of someone stealing them, hijacking them or even intentionally misusing them from inside.

Leave a Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,