Subscribe
  • Home
  • /
  • Security
  • /
  • ITR Technology elaborates on braving the cyberattack storm

ITR Technology elaborates on braving the cyberattack storm

by ManageEngine and ITR Technology


Pretoria, 07 Oct 2015

This has certainly been a session for hackers worldwide, say ManageEngine and ITR Technology. First, it was the US federal agencies. This recent hack, aimed at the Office of Personnel Management (OPM), is already being referenced as the largest government data theft ever recorded. Next was the breach of the German parliament's system. Subsequently, Web sites of several Canadian government services were taken down in another attack.

Only a few weeks ago, LOT Polish Airlines, too, joined the list of cyber victims. The attack led to delayed takeoffs and grounded nearly 1 400 passengers.

A recent report released by the Identity Theft Resource Center (ITRC) claims that there has been a total of 541 data breaches so far in 2015, in the US alone.

Clearly, it is the age of online attacks, and these attacks are merely a prelude to a whole new era of sophisticated hacks. Now, take a moment to think about your data in this era of sophisticated hacking. How strong is your security? Do you have what it takes to safeguard your IT resources and keep attackers at bay? How proactive are you in preventing hackers? If your answer to any of these questions is unclear, it might be time to look into the tips and tools that will help you lock down your security and keep out any possible intrusions. Here is a snapshot on security essentials that keep your basic controls in place.

Consolidate, secure, and manage: Build higher walls around your privileged accounts

Typically, IT divisions in enterprises have a large number of privileged accounts that hold the access to critical assets and classified data. At times, administrators may not even be aware of some of the accounts' existence. These accounts are more commonly known as the Keys to the Kingdom, in the world of information security.

If these keys fall in the wrong hands, they can be used to breach sensitive data, carry out unauthorised transactions, and even delete audit trails to retain anonymity. That is, leaving privileged accounts unmanaged and unattended is a risk serious enough to bring down an organisation. Therefore, adopting a solid security plan is the best option to ensure the security of privileged accounts. You can do this by subjecting these accounts to an automated life cycle management. Some aspects of this security plan should be as follows:

A strong discovery mechanism that automatically detects the IT assets in the network and enumerates the associated privileged accounts.

Consolidating and storing the privileged accounts in a secure, centralised vault, in a fully encrypted form.

Assigning strong and unique passwords to your IT resources, as well as automating periodic randomization of your passwords.

Thankfully, you don't have to do all this manually. With a simple tool such as Password Manager Pro, this automated life cycle management is easier than ever.

Regulate and restrict: Define roles and set boundaries

Providing administrative access to systems without proper controls is like giving out an open invite for a security breach. In fact, security experts claim that the biggest IT risk comes from employees and contractors with unlimited access privileges. There have also been scores of major security breaches that validate this statement, such as those at Barclays Bank, Target, and DuPont. For instance, DuPont fell victim to an intellectual property theft after a contractor working for DuPont sold a proprietary formula for $28 million to one of DuPont's competitors, a Chinese company. Upon investigation, the contractor was accused of conspiring with former DuPont employees and stealing 149 of the firm's trade secrets, between 2006 and 2009.

Managing employee access to passwords can be achieved simply by defining clear roles for your users, as well as subjecting them to access control workflows and request-release mechanisms for password retrievals, which make sure users are allowed to access only the resources they are supposed to. On top of that, additional measures, such as allowing temporary access and promptly revoking it, letting users log on to accounts without viewing the passwords in plain-text, and more will help enforce centralised control over your passwords. These features are also native to Password Manager Pro, which will help you with the small details of security.

Track and monitor: Always keep an eye out

Periodic audits often consist of large grey areas, where you have no clear answers to the "who," "what," and "when" of privileged access. Instead, you should stay aware and track what privileged users are doing by laying down a comprehensive audit trail, which helps monitor and assess user activities. As a matter of fact, proactive monitoring of privileged access has long been a mandatory requirement to achieve compliance with various IT regulations, such as PCI-DSS, NERC CIP, and ISO/IEC-27001. Apart from implementing granular logging, you can also do the following to strengthen your system.

Leverage SIEM solutions to carry out a threat detection analysis in real time by correlating event logs (including password operations), thereby acquiring a comprehensive view of your organisation's privileged account access and usage.

Video record privileged sessions and archive them to support forensic audits in future. Additionally, you can also shadow sessions to monitor or terminate, in case of any suspicious user activity.

To put it briefly, privileged account management, user access management, and proactive monitoring of privileged sessions are the security essentials that will help your enterprise stay in complete control of its IT resources. Hackers almost always aim to compromise privileged identities to access critical assets. With the number of privileged accounts increasing in enterprises, this risk is only getting bigger and the significance of a resilient IT security cannot be stressed enough. Administering a dedicated strategy that incorporates the aforementioned aspects will help you safeguard your organisation from the clutches of cyber criminals.

Share

PasswordManager Pro (PMP)

PasswordManager Pro (PMP) is a Web-based Password Management Solution for enterprises to control the access to shared administrative/privileged passwords of any 'enterprise resource' such as servers, databases, network devices, applications etc. PMP enables IT managers to enforce standard password management practices such as maintaining a central repository of all passwords, usage of strong passwords, frequent changing of sensitive passwords and controlling user access to shared passwords across the enterprise. For more details on PMP, visit http://www.passwordmanagerpro.com

ITR Technology

ITR Technology has been the sub-Saharan African partner to Zoho Corporation for a number of years, providing resellers and end-users local access to the ManageEngine enterprise management solutions. ITR has successfully built a strong reseller and end-user base through cost-effective solutions and management applications. Apart from ManageEngine, ITR Technology is also the distributor of Prism Suite, Empirum Pro from Matrix42 and EgoSecure Endpoint Security. For more information, please e-mail lauren@itrtech.co.za, call (+27) 12 665 5551 or visit www.itrtech.co.za.

ManageEngine

ManageEngine delivers the real-time IT management tools that empower IT teams to meet organisational needs for real-time services and support. Worldwide, established and emerging enterprises - including more than 60% of the Fortune 500 - rely on ManageEngine products to ensure the optimal performance of their critical IT infrastructure, including networks, servers, applications, desktops and more. ManageEngine is a division of Zoho Corporation with offices worldwide, including the United States, India, Singapore, Japan and China. For more information, please visit http://buzz.manageengine.com/

Editorial contacts

Chantel van Niekerk
ITR Technology
(+27) 12 665 5551
chantel@itrtech.co.za