Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Top 5 Cybersecurity "Dirty" Words – and How to Avoid Ever Saying Them Again

March 22, 2018

  • Blog
  • Archive
George Carlin made comedy history when he created stand-up routine around the seven dirtiest words that could never be said on the radio or on television. (For the sake of our readers, a simple search on YouTube will find the routine – it is adults only content!) What made this routine so unique is that he boldly came out and stated seven words that no one should ever write, say, or even hear – privately or publicly. That concept alone is all this blog is about. There are five cybersecurity words team members never want to hear regarding their own organizations. Listed in priority order, according to my humble opinion, they are:
  1. Incident – “We have had a security incident within the organization.”
  2. Malware – “We have identified a malware infestation and need to remediate the issue immediately.”
  3. Ransomware – “We have been infected with ransomware.”
  4. Compromised – “We have detected that system(s) have been compromised.”
  5. Breach – “We have identified a data breach.”
So why are these words so dirty? Each one of them alone does not tell you the size, scope, risk, or repercussions of the cyber security problem in question. They are “dirty.” If you have to say, or hear, a team member say that you have been infected with ransomware, the scope and threat are absolutely filthy. We need to find a way to clean up these dirty words and make sure they are never used within our own organizations. To that end, I propose the following:
  • Privileged Access Management – removes and manages administrator rights that could otherwise lead to someone saying any of the five dirtiest cybersecurity words.
  • Vulnerability Management – ensures remediation practices are performed, preventing exploitation that otherwise could lead to a vocalization of a dirty word.
  • Identity & Access Management – manages the entitlements of people so we can minimize the risks of them performing an act that could otherwise lead to swear word.
We never want to be singled out for saying a bad word. We also never want to be the bearer of bad news based on a cybersecurity incident within our organization. So, to prevent us from ever saying them, we can embrace cybersecurity best practices and minimize the risk of us even being tempted to utter them under our breath. As the leader in privileged access management and leader in Vulnerability Management, BeyondTrust is in a unique position to help with these basic cybersecurity hygiene disciplines and clean up your environment. The results could be just what we need to ensure we never have to utter those dirty cybersecurity words again.

Morey J. Haber

Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 25, 2021

Customer Tips & Tricks: Remote Support for Android

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.