While organizations often acknowledge the need to implement solutions for the protection and management of privileged account credentials, a recent study found that very little are actually taking the necessary steps in employing best security practices.

According to the 2016 State of Privileged Account Management (PAM) report by Thycotic and Cybersecurity Ventures, one out of five organizations have never changed their default passwords on privileged accounts, despite that fact that 80% of respondents consider PAM security a high priority. In addition, 30% of organizations surveyed claim they still allow accounts and passwords to be shared, and 40% claim they use the same security for privileged accounts as standard accounts.

What’s most alarming is that the majority of data breaches are caused by stolen credentials and privileges accounts, and continues to be the main target for hackers.

According to Steve Morgan, CEO at Cybersecurity Ventures, “Privileged accounts contain the keys to the IT kingdom, and they are a primary target for cyber criminals and hackers-for-hire who are launching increasingly sophisticated cyber-attacks on businesses and costing the world’s economies trillions of dollars in damages.”

The ‘Insider Threat’ is alive and well. What defenses does your organization have in place to protect against a trusted employee gone rogue or an employee who makes a careless mistake that could put sensitive data in the wrong hands?

By implementing solutions like Database System Hardening into your IT environment, your database will be continuously monitored for compliance with your selected hardened build standard. Hardening your database system is vital for protecting your organization's most vital assets.

With NNT’s Change Tracker Gen7, user accounts and password settings, as well as roles and assigned privileges, are audited and tracked.

 

Read this article on SCMagazine

 

 

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.
Portland
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.