Modern IT infrastructures are diverse and complex. The number of endpoints has greatly increased and the proliferation of remote work means organizations’ security perimeters have been scattered far and wide. The increased prevalence of BYOD (Bring Your Own Devices) policies used by remote employees and third-party contractors has played a major role in threatening corporate security. More BYOD endpoints mean more digital avenues into critical systems that need to be protected.
An engineer is starting her first day at a cybersecurity firm. What is the likelihood that she walks straight into the office without speaking to anyone, then begins accessing information from the nearest workstation?
You may be familiar with Privileged Access management – PAM – because of its capabilities as part of a comprehensive defense against cyberthreats. In a strong PAM solution those capabilities are many and varied, and allow network security teams to design a defense-in-depth strategy that adheres to security-first, Zero Trust principles to secure their organizations' most sensitive assets. Yet as important as it is to protect against cyberthreats, there is another key aspect of cybersecurity with which organizations need to concern themselves: Compliance with regulatory and industry standards.
The elements of effective cybersecurity are both a broad and a deep subject for discussion, and the details of any one particular element bears in-depth discussion of its own. That said, such details are often best left to companies' cybersecurity teams to investigate and implement – but in no regard should executive teams remain completely uninformed of the high-level elements that should comprise proper, well-rounded cybersecurity within their organizations.
Every year over the past decade has seen a variety of successful hacking attempts and data breaches at companies both large and small, and 2019 has been no different. Here are three of the top data breaches this year, along with some observations on how privileged access management (PAM) might have helped to mitigate or even possibly have prevented these breaches.