Five Tips to Secure Privileged and Shared Accounts

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for tips on securing access to privileged and shared account data. 

Failing to manage shared passwords adequately can expose organizations to serious vulnerabilities, particularly in the case of privileged accounts where a disgruntled employee could potentially have the power to hold an entire network hostage.

Keeping track of privileged user and shared access accounts is also important for accountability. Unfortunately, however, many organizations simply don't know for sure who has access to shared passwords. Far too often, the entire IT department knows the details of what is supposed to be a limited-access password.

All kinds of employees, from office administrators and temporary workers to nurses and civil servants require access to shared account logons for enterprise applications and systems for all kinds of reasons. IT managers, therefore, need to strike a balance between providing the flexibility required to meet end users’ needs and ensuring security and compliance with corporate policy and the latest industry regulations and legislation.

Use these tips to close the security gaps associated with shared password management as well as introduce a cost-efficient way for your organizations to comply with data protection and PCI DSS regulations that prohibit the sharing of accounts between users.


More Slideshows:

8 Essential Layers of Security for Every PC PC security starts at the edge of the network, and has to cover every entry point -- including the browser.

5 Password Rules Every User Should Follow Proper training for small and medium-sized businesses is critical, and this is especially true when it comes to proper security practices.

Symantec Hosted Services' Top 5 Security Threats Make sure you are prepared for these major security threats facing companies today.



 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AppRiverScamPreventionTips0x Five Tips to Avoid Falling Victim to Online Scammers

While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill." ...  More >>

HAXLR8RStartups0x Robotics Take Center Stage: Ten New Hardware Startups

Recently, HAXLR8R held its Demo Day in San Francisco, where it revealed its fifth class of new hardware startups, which span the markets from wearables to security to biology. ...  More >>

Security49-190x128 Using Tokenization for Superior Data Security

With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date