Archive for: October 2016

Why User Identities Are the Weak Link in Enterprise Security

According to the Identity Management Institute, more than 90 percent of all cyberattacks are successfully executed with credentials obtained from unwitting users. Spear phishing attacks are the most common method used to steal this information. It is easy and inexpensive for cybercriminals to send a fake email with a malicious attachment or link that downloads spyware to the victim’s...

Overcoming the Operational Obstacles to Privileged Account Security

Privileged account management is one of the most critical components of any enterprise security strategy. Cybercriminals prize privileged account credentials because they provide administrator-level access to servers, security systems, network devices, databases, applications and other resources. If hackers are able to obtain the “keys to the kingdom,” they gain virtually unfettered access to an organization’s systems and data. Best...