Zero trust network access vs. least privileged access
January 17, 2022
If there’s a phrase as buzzy as Zero Trust these days, it’s least privileged access. The two sound similar in both name and concept. If you’re employing zero trust aren’t you, by default, also only granting least privileged access?…
How access monitoring protects providers from health data breaches
January 11, 2022
With the average healthcare organization going through over 2.5 million EMR accesses a day, it can be difficult for an organization to ensure those accesses are safe, all important data is secure, and that industry-specific compliance is reached.…
If you’re an average size healthcare organization, the amount of EMR access happening in your network, per day, can top 2.5 million. That can be hard to fathom at first, but it makes sense.…
As Big Tech is under attack from Congress and the public about how they handle and monetize customer private data, some companies have chosen to pivot. Instead of collecting and profiting off of consumer data, their focus is on protecting privacy. …
The Colonial Pipeline hack, in the end, came down to poor access management. The hackers found their way into operational technology (OT) through a VPN password that had never been de-provisioned. A small error that cost millions.…
Stay vigilant: What we can learn from the Kronos hack
By Wes Wright, CTO
|
December 15, 2021
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.…
At the end of last year, we said that in 2021 ransomware would be here to stay, and the big trends will be third-party attacks and cyber terrorism. While no one likes to say “I told you, so,” especially when it comes to cybersecurity, the past 12 months saw headline after headline about ransomware attacks, third-party hacks, breaches of valuable data (like EMRs),…
What to look for in enterprise access management software
December 3, 2021
When it comes to securing internal credentials, controlling the movement of internal users, and provisioning or de-provisioning internal access rights, it can be done in-house. Enterprise access management best practices call for aligning those user rights with an internal HR system, and creating a robust access policy for internal users is do-able for most organizations, especially when it’s dealing with internal access and more routine access points (like email).…
While access governance is the big picture, policy-building part of Critical Access Management, access control is the double-locks and extra protections that help keep an organization’s most valuable assets safe.…
Many in the managed service provider (MSP) market are turning to Imprivata to complement their security offerings by implementing a solution that lowers liability, increases efficiency of remote connections, and exceeds clients’ security, audit, and compliance needs.…
The termination gap can cause all kinds of trouble. That length of time between an employee leaving their role and their user access being de-provisioned is when dangerous activities can occur -- including a malicious breach by that internal user -- and the truth is, organizations aren’t worrying enough about it. …
Every organization will be quick to say that their systems are secure, and a breach won’t happen. In fact, according to a recent report by Skybox Security, 73% of CIOs and CISOs are "highly confident" they will not suffer an operational technology breach in the next 12 months.…
Three ways to determine critical versus routine access
November 12, 2021
There’s one question every organization needs to be able to answer: What are the company’s specific critical access points? It’s easier asked than answered, and depending on the system, the users, the assets, and a few other factors, critical access varies by organization and use case.…
Enterprise password vault vs. privileged access management
By Peter Senescu, Director of Sales, Emerging Solutions, PAM
|
November 9, 2021
When it comes to securing privileged credentials, companies often turn to enterprise password managers or privileged access management solutions. This leads organizations to ask, “Which solution is best?"…
How critical access management protects three industries from cyber threats
November 8, 2021
Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.…