dcsimg

Seven reports you can share with auditors and execs to demonstrate proactive privilege management

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent malicious activity and accidental data breaches By … [Read more...]

Get Back to the Basics this World Password Day 2018

If you believe passwords will be killed off by biometrics, read this stat from a recent Cybersecurity Ventures report: “The world will need to secure over 300 billion passwords by 2020.” What happened to biometrics? Many visionaries declared that the release of Apple’s Face ID would call for the end of passwords as we know them. The reality is, it’s not that simple. Just months later … [Read more...]

2018 Global State of Privileged Access Management Risk and Compliance: Part 1

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin to implement Privileged Access Management … [Read more...]

Symantec Internet Security Threat Report 2018: The Top Takeaways

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it—is rapidly impacting everyone’s daily life and there is no longer a disconnect between personal and work life. In the past cyber-attacks were usually only a … [Read more...]

Key takeaways from the 2018 Verizon Data Breach Investigations Report

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniques (many which are well known) and we have failed to stop them. “HACKERS CONTINUE TO USE KNOWN EXPLOITS” This report is a must-read for cyber security … [Read more...]

Microsoft’s Frankenstein Approach to Endpoint Protection

With Windows 10 Microsoft has embedded and enhanced a number of free tools it claims give IT and security teams the opportunity to close security gaps exposed in previous versions of Windows. One of the critical goals Microsoft aims to address is the principle of least privilege. Under a least privilege policy, administrative credentials are removed from workstations in order to block threat … [Read more...]

Will Fake News Lead to the Next Cyber War?

Fake news is running rampant across all media outlets. While you may not take them seriously, these untrue news stories are playing with your emotions and have serious security implications. With over half the world’s population online and using social media, news travels fast. And sometimes the wrong news gets spread. What happens when it’s by our most trusted news source? How are readers able to … [Read more...]

The EU GDPR Checklist: It’s go time!

Yes, you’ve all heard about it. Many companies have been raising the alarm and increasing awareness about GDPR—General Data Protection Regulation—for months now, all offering solutions for anything at all to do with GDPR. It’s caused a lot of confusion, raised many questions—and organizations have no idea where to start. Many assume they are excluded and do not need to do anything—this is not … [Read more...]

New South Wales Government failure highlights critical nature of PAM

The New South Wales Government’s cyber security strategy is under urgent review after Auditor’s Offices criticised the way its agencies are handling privileged access and other basic security practices. At the end of last year (20th December 2017) the government of New South Wales received an unwelcome Christmas present from its own Auditor’s Office. This came in the shape of an 82-page report … [Read more...]

How to Protect Your Desktop Team When Moving to Least Privilege 

When companies yank local administrative privileges from business users without considering the downstream impact, their least privilege programs are doomed to fail. Suddenly unable to download applications, run programs, install printers or make other system changes, users will be confused and frustrated. Those frustrations are going to land squarely on the plate of the desktop support … [Read more...]