
We’ve covered a lot of password security tips and ways to secure your credentials on The Lockdown. For World Password Day 2019 we thought we’d do things a bit differently and share some of the worst password fails this past year. While these organizations and individuals may not appreciate the extra attention, these password fails…
This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks. There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity. Why do organizations use admin rights in the…
Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but…
When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security…
Do you have that one great password that you love? It’s your go-to when creating a new account. You love it because it’s reliable and usually tied to a fond memory like the street you grew up on, or your childhood pet. Problem is, your favorite password is putting you at risk For many, that…
Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization. Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have…
In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…
For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long, complex password that only you would know, and it protected one or two accounts; you likely…
From a cyber criminal’s point of view, obtaining privileged account information has the highest ROI of any attack strategy. A malicious actor with privileged account passwords in hand could infiltrate key databases and access highly sensitive data. To obtain this information, attackers use increasingly sophisticated tools and social engineering techniques which are extremely difficult for…
Privileged access management (PAM) can be defined as managing privileged accounts and delegating privileged actions. Within an organization, it governs who can access or use a privileged account and what they can do once logged in with that privileged account. Privileged access management includes both privileged account management and privileged session management. The PAM process…