More and more organizations are realizing they need to do more to protect access to their privileged accounts and systems, but are missing the mark when assembling a privileged access management strategy. Organizations may focus on securing admin credentials used by their people, but not those used by machines, such as service accounts or credentials that are hard coded into applications.
We often hear that organizations are hesitant to regularly change the passwords for these accounts out of fear of being locked out of that account, and any disruption to uptime is an admin’s worst nightmare. We’ve actually heard of one company not changing this type of password for 11 years! Threat actors know that neglecting these accounts is a common “pitfall”, and once they’ve gained a foothold onto your network and move laterally, they’ll be looking for this type of access because it’s an easy way in to interact with other systems and exfiltrate more sensitive data.
Securing privileged access for insiders and vendors plays a crucial role in any organization’s approach to cybersecurity – and securing the ‘non-human’ accounts is equally as critical. Embedded static usernames and passwords in apps and scripts need to be changed and rotated, frequently.
Bomgar can help your organization build a “pitfall-proof” privileged access strategy. Bomgar allows employees and vendors to access systems and support people easily, while protecting credentials and endpoints from threats. Increase access speed and agility, while enforcing least privilege best practices, to simultaneously drive business performance and security.
Check out this webinar for more insight into shoring up your security posture, including more robust solutions for managing and securing privileged access, the ultimately and avoid the pitfalls of privilege.
Sam Elliott, SVP, Products, Applications, PPM
At Bomgar, Sam is responsible for the product management group that is driving product strategy for Bomgar’s security products. He has more than a decade of information security, ITSM, and IT operations management experience. He also is a seasoned expert in the areas of cyber-security, data center discovery, systems configuration management, and ITSM. Sam has a Bachelor of Science from Florida State University and is certified in ITIL v3 and Pragmatic Marketing. He resides in Atlanta, GA with his family and can be found on twitter @samelliott.