Remove Accountability Remove Passwords Remove System Administration Remove Technology
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

These hacking waves contribute to the harvesting of account credentials and unauthorized access to loosely-configured servers; and these ill-gotten assets can, in turn, be utilized to execute different stages of higher-level hacks, such as account takeovers and ransomware campaigns. These are simple steps to take,” he told me.

article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

Côté outlined how and why many SMBs are in a position to materially improve their security posture – by going back to a few security basics, in particular by paying closer attention to privileged account management , or PAM. Some context: privileged accounts first arose 20 years ago as our modern business networks took shape.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Mandiant notified Kaseya after hearing about it from Alex Holden , founder and chief technology officer of Milwaukee-based cyber intelligence firm Hold Security.

Software 286
article thumbnail

Announcing Duo’s Vision to Streamline Authentication & Enhance User Experience

Duo's Security Blog

During the workday, on the other hand, I spend a lot of time talking to systems administrators, security operations analysts, and IT professionals who do love MFA. Compare this to climbing the hill of Windows Logon, VPN logon, and web application logon - all with username, password, and Duo prompt - just to get to work in the morning.

article thumbnail

The Implications of the Uber Breach

Security Boulevard

These types of "unauthorized access" attacks account for 50% of all data breaches and can cost companies as much as $9.5M No amount of investment in the latest technology can provide 100% protection because technology alone is not enough. If that is necessary, make sure there is regular rotation of those system passwords.

article thumbnail

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The researchers concluded that for many people involved, cybercrime amounts to little more than a boring office job sustaining the infrastructure on which these global markets rely, work that is little different in character from the activity of legitimate system administrators.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Last Watchdog recently sat down with Satya Gupta, founder and CTO of Virsec , a San Jose-based supplier of advanced data protection systems. Virsec is a leading innovator of memory protection technologies. Privilege account credentials are widely available for sale. Here’s what I took away from our discussion: Transient hacks.

Hacking 212