

Todd Peterson
IAM evangelist /*=$expert->feature_status*/ ?>
One Identity
Comments Dotted :
5
July 16, 2020
Touching such high profile Twitter accounts should be tied to an approval process.
Providing great customer support for high profile customers means IT administrators need privileged access to their accounts - to help reset passwords and to help clear up after an account takeover. However, with this great power comes great responsibility - and it takes only one bad admin to create global chaos by abusing their privileged access. Touching such high profile Twitter accounts should be tied to an approval process, where a single person can not act alone, without a detailed.....Read More

October 22, 2019
Organisations should not treat database security any differently from other security.
This simply reinforces the notion that good Privileged Access Management practices are the best defense against bad actors. Had the Equifax breach been the result of an extremely smart and motivated hacker doing something amazing to get the data, that would have been one thing. But since it’s the case of the target ignoring the bare-minimum of best practices and paying a significant price for the oversight, what happened is alarming. In the case of Equifax, simply doing what’s right (which.....Read More

October 03, 2019
This is particularly in the case of higher education institution which are at risk as a result of maintaining old computers.
In 2018 it took just 16 minutes for the first click to occur on a phishing email. As such, it is worrying that in 2019, that timeframe has not lengthened at all. Whilst advanced privileged access management systems and two factor authentication may be used correctly by organisations, newly developed infected emails can still pass the defence line and enter a network. With this in mind, it is important that identity and access management systems and processes are current, with the fast moving.....Read More

September 16, 2019
Server misconfigurations are on the news every week, and in some cases lead to massive data leaks.
This case further illustrates how organisations of all kinds are still getting security wrong because generally, security is a hassle to their business. No one likes entering user IDs and passwords and even fewer like entering the second factor of authentication that should be used by all organisations. Server misconfigurations are on the news every week, and in some cases lead to massive data leaks, such as the one suffered by the Ecuadorian civil registry.
However, there are options to make.....Read More

August 29, 2019
Long term, you can combine your PSM with Privileged Account Analytics which detect anomalies in the privileged users' behaviour.
Advanced Privileged Access Management solutions can help safeguard an organisation’s IT environment by protecting and securing backend resources which are accessed by administrators, whose credentials can be used to escalate privileges.
Of course, patching this vulnerability is key to mitigating the problem. In addition, by using Privileged Session Management (PSM) to strategically limit command or application execution to only those necessary for given tasks or more tactically block.....Read More
