Many cyber attacks are based on the misuse of administrator rights and stolen passwords. This is where a solid defence strategy should start, because damage to the company can be averted through effective control of rights and access data by means of Privileged Access Management (PAM).
Who hasn't experienced this: many users within the organisation want as many rights as possible so they don't have to call support every time they need them. On the other hand, the IT department doesn't want to be contacted for every little issue - so it's tempting to give users more rights than they actually need. This creates a considerable risk - lose of control, because employees are able to make unlimited installations and changes, possibly affecting the stability or performance of the system.
Much more dangerous, however, is that an attacker can compromise an account with privileged access rights and cause considerable damage.
Who has which rights in the company, for how long and why? Where in the company are privileged accounts located and how are they used? Who has access to these accounts and thus access to critical target systems? Is access data regularly exchanged in accordance with a strong password policy? Questions like these should definitely be answered in order to minimise the risk of misuse and thus a possible attack. A PAM solution can help.
This presentation will explain how a Privileged Access Management (PAM) solution including least privilege can help to contain serious cyber threats and at the same time create a solid security foundation for a successful digital transformation.