12/08/2020 - 11:38 AM
Same old story. Motivated to cause disruption or by a potential financial gain, attackers follow a tried and true attack path typically starting at the endpoint with phishing. Industry research shows 80% of successful security attacks involve compromised privileged access. In the case of Twitter’s high-profile breach, an insider threat adds another familiar element to the story.
With a dramatic increase of remote workers comes an expanded attack surface. Workers today are distracted while juggling work and family responsibilities, and there is increased stress related to a global pandemic and an uncertain economic future. There's not a better time to review the priorities of your security program to ensure policies and practices reflect new realities.
Questions every security leader asking right now: How are we identifying what our most critical systems, tools, data and infrastructure are and who has access? Who is considered a privileged user (this includes business users) and what steps are we taking to manage, monitor and protect that access?
Join us for a webinar on Wednesday, August 19 at 11:30am SGT: https://lp.cyberark.com/20200819-Twitter-Deconstruct_Registration-Page.html to learn about security trends and best practices including:
Reasons identity is the new perimeter
Isolating access to the administrative system and requiring dual control for highly sensitive operations
Continuous monitoring and user behavior analysis on applications through a monitored proxy
Implementing least privilege controls to minimize access to sensitive functionality
The Twitter attack highlights the dangers of unsecured privileged access to critical resources and how quickly any credential or identity can become privileged under certain conditions.