#SecurityNews: Why a User Access Control Policy is crucial for your organization

#SecurityNews: Why a User Access Control Policy is crucial for your organization

Organisations spend a lot of time and effort protecting their networks from external attacks. However, it is insider threats that are viewed as one of the biggest risks to corporate data according to IT decision makers surveyed in the Cyber-Ark 2012 Trust, Security & Passwords report.

To efficiently mitigate insider threats and reduce the attack surface of an Information System, a network must be set on a ‘need-to-know’ and ‘need-to-use’ basis.

In real terms, this means that IT departments must ensure that each user in their organisation can only log in according to the pre-authorisation that has been granted. Unfortunately, this is usually not the case.

Complete article by techradar

#SecurityNews: Why a User Access Control Policy is crucial for your organization

#SecurityNews: “4 reasons companies say yes to open source”

When individual developers think of open source, they think «free.» And with good cause: Who in their right mind wouldn’t be interested in technology that they can get at no cost and use with few licensing restrictions?

When companies think of open source, these days they think «business agility,» a quality they increasingly value above all others in the fast-changing marketplace.

The ability to create new applications quickly, reliably and economically is drawing businesses big and small to open source and emboldening them to use it for ever-larger projects, IT practitioners say.

Which is likely why open source’s popularity is booming (with a few holdouts). According to the Forrester Research report «Development Landscape: 2013,» 76% of developers have used open-source technology «at some level,» says Jeffrey Hammond, a Forrester analyst specializing in application development and delivery.

Open source keeps costs down

Cost savings may be only part of open source’s allure, but it’s still a big part, no matter what size the organization. «How can Netflix charge as little as $8 per month for its service?» Hammond asks. «Because everything is built on open-source software. They focused on content, not building an operating system or a testing framework.»

Complete article by ComputerWorld

#SecurityNews: Why a User Access Control Policy is crucial for your organization

#SecurityNews: “Sensitive data management in the coming year”

As 2013 draws to a close, it has become clear that every major industry maintains sensitive data, and has been targeted by hackers. This year ushered in a new batch of highly publicized data breaches that affected millions of consumers, many of whom became the victim of identity fraud. From an enterprise standpoint, these breaches not only eroded consumer trust, but they also open businesses to fines, penalties, and class-action lawsuits for not properly securing private data.

Based on the increasing volume of data businesses now manage, and the growing capabilities of cyber criminals, I expect the following scenarios to become more commonplace in 2014:

ID thefts to target: Affordable Care Act

Medical identity fraud is a lucrative source of income for perpetrators who bill for fraudulent medical services or obtain insurance, government benefits or prescription drugs. Medical fraud endangers patients’ health and costs consumers millions of dollars each year. While hospitals and providers will remain targets of criminal rings seeking personal health information, newly created health insurance exchanges under the Affordable Care Act create new security risks for millions of Americans.

Complete article by ScMagazine 

#SecurityNews: Why a User Access Control Policy is crucial for your organization

#SecurityNews: “Cybersecurity Will Get More Complex in 2014”

Bad news for all businesses, big and small. Cybersecurity is going to get a lot more complicated in 2014. Global nonprofit IT association ISACA believes IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data.

“The pace of change expected in 2014 will put incredible pressure on technology professionals in the workplace with a focus on keeping IT risk in check while at the same time delivering value to the business,» said Bhavesh Bhagat, CEO of EnCrisp, co-founder of Confident Governance and member of ISACA’s new emerging business and technology committee.

Among the areas ISACA predicts businesses should be preparing for in 2014 include:

Complete article by BusinessNewsDaily

#SecurityNews: Why a User Access Control Policy is crucial for your organization

#SecurityNews: “A growing threat: Privileged user abuse”

A U.S.-based global energy company employee with privileged user access was enticed by a foreign company to steal source code and other intellectual property from his employer. As a result of his theft, the company lost three quarters of its revenue, half of its workforce, and more than $1 billion in market value.

This incident caused such extensive damage one might consider it to be an anomaly, but it is not; it is an all too common example of one of the costliest risks companies face daily, that of privileged user abuse. According to a national fraud survey, $348 billion a year in corporate losses can be tied directly to privileged user fraud.

Chief information officers across the country are keenly aware of the threat not only to their intellectual property, but ultimately to their bottom line. The risk of intellectual property theft isn’t limited to a certain industry, it happens across the board from the financial sector to energy and health care to the federal government. In fact, the federal government is so acutely aware of this risk they recently issued a memo renewing their efforts to thwart privileged user abuse.

Complete article by ScMagazine