Privileged Account Attacks

Privileged account attack is a specific kind of cyberattack used to gain unauthorized access to a secured perimeter, which can also be used to obtain crucial information from a critical system. Deploying a privilege escalation in a protected network structure, though difficult to pull off, can pose quite a bigger threat to an organization’s future. […]
IT Paradigm Shift, People and Challenges

Recap Do employees/end-users resist IT process changes? If yes, then why? Why changes (even if necessary) in internal IT processes are not readily accepted by employees/end-users? How can organizations address employee/end-user concerns? In two of our earlier blogs, we have discussed the reasons why people resist changes in the organization and how to overcome […]
Global Remote Access: Challenges Addressed

Remote access security has become a burning topic lately, thanks to the global pandemic. Security, risk and compliance managers face a new challenge: How to reinforce the security measures as to access control in remote work conditions. While organizations have realized that working remotely is the only way to ensure business continuity, the remote […]
Threats to Digital Identity

What is Identity? It is nothing but the distinctive or identical qualities, beliefs, looks or personality traits that develop or establish a quality of a person. There are multiple ways to categorize identity, as per action. Most of the time, it is behavioural, though sometimes it might be psychological too that can relate to the […]
Top 10 Mistakes in Privileged Access Management

Introduction Privileged Access Management (PAM) is a mechanism that securely manages and controls the privileged users. These users have elevated rights to access the critical IT resources, which could be databases, cloud resources, business applications among many more. Privileged IDs, login credentials created for privileged users, are high-value targets for cyber criminals since these are […]
Mitigate the Risk of Excessive or Shared Privileged Credentials

In the wake of expanding IT infrastructure, today’s organizations require their employees to access multiple applications to perform day-to-day IT administrative and operational activities. That means, the end-users require multiple credentials to access the multiple applications. Simple? Not at all. It’s a nightmare both from IT administrators and end-users’ point of view. The IT helpdesk […]
Why is the Healthcare industry highly vulnerable to cyber attacks?

The healthcare industry is arguably the most targeted by cybercriminals. Here are some of the major cyber incidents targeting healthcare companies in the last 12 months. Incident 1 Cyberattack on datacenter of a major global pharmaceutical company in India. Consequently, the pharma company had to shut down some of its major facilities across the world […]
3 essential requirements for today’s complex data-center environment

Overview Who should be assigned elevated access rights? How should we ensure robust access control? What are the best solutions available to ensure identity and access security? Are the right people having access to the rights systems at the right time? Are there adequate IT policies in place? These are some of the critical questions […]
Cyber security readiness or cyber security policy – Which weighs more?

What is cyber security readiness? Organizations across the world are embarking upon changing IT infrastructure and digitalising their operations for more efficiency. However, with the arrival of advanced and sophisticated technologies in every industry, cyber threats are also getting complex day by day. Many times, organizations are not aware of the emerging threat patterns. Even […]
10 Alarming Cyber Security Facts

The prominence of well-instructed cyberattacks is growing almost on a daily basis. In some cases, they are being deployed to manipulate primary elections, while the others are employed to cripple a large business. Hence, the role of cyber warfare is, indeed, taking over our everyday lives, in one way or another. To prevent cyberattacks, many […]