While organizations often acknowledge the need to implement solutions for the protection and management of privileged account credentials, a recent study found that very little are actually taking the necessary steps in employing best security practices.

According to the 2016 State of Privileged Account Management (PAM) report by Thycotic and Cybersecurity Ventures, one out of five organizations have never changed their default passwords on privileged accounts, despite that fact that 80% of respondents consider PAM security a high priority. In addition, 30% of organizations surveyed claim they still allow accounts and passwords to be shared, and 40% claim they use the same security for privileged accounts as standard accounts.

What’s most alarming is that the majority of data breaches are caused by stolen credentials and privileges accounts, and continues to be the main target for hackers.

According to Steve Morgan, CEO at Cybersecurity Ventures, “Privileged accounts contain the keys to the IT kingdom, and they are a primary target for cyber criminals and hackers-for-hire who are launching increasingly sophisticated cyber-attacks on businesses and costing the world’s economies trillions of dollars in damages.”

The ‘Insider Threat’ is alive and well. What defenses does your organization have in place to protect against a trusted employee gone rogue or an employee who makes a careless mistake that could put sensitive data in the wrong hands?

By implementing solutions like Database System Hardening into your IT environment, your database will be continuously monitored for compliance with your selected hardened build standard. Hardening your database system is vital for protecting your organization's most vital assets.

With NNT’s Change Tracker Gen7, user accounts and password settings, as well as roles and assigned privileges, are audited and tracked.

 

Read this article on SCMagazine

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.