Mobile Search Mobile Menu

Search Results

How to Avoid a Data Breach Through Effective Privileged User Management

Avoid a Data Breach Through Privileged User Management According to a study by Forester, up to 80 percent of data breaches are attributed to misuse or abuse of privileged credentials. This is because many organizations tend to overlook the importance of managing and securing their super accounts or administrator accounts. Like other users and typical IT workers, […]

Limit Vendor Risk – Step 1: Properly Grant and Remove Access

In my last post, I introduced four steps you can take to limit vendor risk. In this month’s post, we’ll take a slightly deeper dive into step 1: properly granting and removing access. Access to systems must be controlled and granted only with proper approvals. If you follow the steps below, you can easily maintain […]