Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Privilege Management Stems Social Engineering Scams

Avecto : 16 August, 2012  (Technical Article)
Paul Kenyon of Avecto explains how the adoption of a policy of reducing privileged accounts in the enterprise can reduce the effect of socially engineered cyber attacks
Privilege Management Stems Social Engineering Scams
Commenting on recent reports which assert that cybercriminal social engineering attacks are now targeting IT admins and even call centre staff, Avecto says that a least privilege approach to security is the key to solving this issue.

Paul Kenyon, chief operating officer with the Windows privilege management specialist, says the real reason why cybercriminals are targeting the IT support function is the immense power that staff in these areas have - thanks to the admin accounts they have access to.

“Many of these staff are using what security professionals call privileged accounts - that is, admin accounts that can carry out a number of high-end tasks, which the more mundane user accounts do not normally have access to. If unnecessary privileges are removed from these accounts, this lowers the security risk involved,” he said.

“It’s important to understand that, where IT admins and least privilege are concerned, it’s not about taking rights and privileges away – it is about protecting their privileged identity, empowering them to make conscious decisions on when those privileges are used, and monitoring all privileged activity for signs of misuse or exploitation,” he added.

The Avecto COO went on to say that the advantage of adopting a least privilege/least risk security posture with admin account privileges is that the security advantages also transfer over to the servers these IT admins control.

The process of removing unnecessary privileges from the admin account arena, he explained, comes down to adopting an effective audit and governance strategy, which in turn reduces risk and increases efficiency.

“It’s important to understand that, if you reduce the privilege on high-end accounts, you do not impair operational efficiency. You do, however, reduce the level of risk in an organisation – and that’s a great situation to be in,” he said.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo