While organizations often acknowledge the need to implement solutions for the protection and management of privileged account credentials, a recent study found that very little are actually taking the necessary steps in employing best security practices.
According to the 2016 State of Privileged Account Management (PAM) report by Thycotic and Cybersecurity Ventures, one out of five organizations have never changed their default passwords on privileged accounts, despite that fact that 80% of respondents consider PAM security a high priority. In addition, 30% of organizations surveyed claim they still allow accounts and passwords to be shared, and 40% claim they use the same security for privileged accounts as standard accounts.
What’s most alarming is that the majority of data breaches are caused by stolen credentials and privileges accounts, and continues to be the main target for hackers.
According to Steve Morgan, CEO at Cybersecurity Ventures, “Privileged accounts contain the keys to the IT kingdom, and they are a primary target for cyber criminals and hackers-for-hire who are launching increasingly sophisticated cyber-attacks on businesses and costing the world’s economies trillions of dollars in damages.”
The ‘Insider Threat’ is alive and well. What defenses does your organization have in place to protect against a trusted employee gone rogue or an employee who makes a careless mistake that could put sensitive data in the wrong hands?
By implementing solutions like Database System Hardening into your IT environment, your database will be continuously monitored for compliance with your selected hardened build standard. Hardening your database system is vital for protecting your organization's most vital assets.
With NNT’s Change Tracker Gen7, user accounts and password settings, as well as roles and assigned privileges, are audited and tracked.
Read this article on SCMagazine