Get a Pentest and security assessment of your IT network.

Cyber Security

Privileged User Access Lacking Trust But Verify

New research commissioned by Raytheon Corp. asked 700 database administrators, network engineers, IT security admins and cloud computing admins about privileged user abuse. Half of the respondents to the survey said their respective organizations do not have policies for assigning privileged access, though for those companies that do, there are fewer ad-hoc approaches than the last time this survey was conducted, in 2011. The result may not be as severe as Snowden s surveillance revelations, but can still expose companies to data or financial loss, or reputational harm.

Source: https://threatpost.com/enterprises-still-lax-on-privileged-user-access-controls/106180/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation