The data breach at UK accounting software company Sage has brought the insider threat facing businesses into focus and, according to security experts Hypersocket Software, highlights the need for more stringent access control.
The Sage breach, which may have compromised the personal information of employees at 280 businesses, is thought to have resulted from unauthorised access from an internal computer log-in.
In contrast to the popular image of evil hackers trying to steal data using brute force and denial of service attacks, this latest incident emphasises that the danger for organisations can just as easily come from inside. In addition to the threat of malicious activity from otherwise legitimate insiders or employee errors, there also is a risk that the user credentials can be compromised and that the ID authentication process can be exploited to let malicious outsiders into the system.
But according to Lee Painter CEO of Hypersocket Software many businesses are not properly addressing the risk from within their business and do not fully follow the principle of least privilege access.Read More
Managing the identity and access privileges of users on your network and IT systems is essential to cybersecurity. Hypersocket Software corporates a suite of ID and access management tools that provide a common user experience and enable organizations to enforce least privilege policies for remote users.
It can automate tasks and make resources available in real-time, enabling collaboration and sharing to an extent not before possible. The emergence of cloud services and increasingly powerful mobile devices are extending these capabilities beyond enterprise perimeter, making the IT system a productivity tool for employees and partners not only in the office, but anywhere in the world. However, unlike most powerful tools, this is a double-edged sword. Remote access to online resources can effectively negate perimeter defences and extend the domain of the insider threat worldwide.
This makes managing identity and the access privilege of users even more essential to cybersecurity. Systems need to be able to authenticate the identity of users, and in some cases also the devices being used for accessing together with the location and type of networks being used. Only then can access privileges be securely granted, based not only on identity, but also the user’s role in the organization and the circumstances of the connection. An employee connecting to a system during business hours over a secure network might be given wider privileges then when connecting from the other side of the world in the middle of the night, for instance.Read More