Five Tips to Secure Privileged and Shared Accounts - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips to Secure Privileged and Shared Accounts-6 Next

For some particularly sensitive accounts, organizations might also want to consider controlling the usage of privileged or shared password by policy. For example, by setting a limited time window for their use, or prescribing maximum number of logons.

Failing to manage shared passwords adequately can expose organizations to serious vulnerabilities, particularly in the case of privileged accounts where a disgruntled employee could potentially have the power to hold an entire network hostage.

Keeping track of privileged user and shared access accounts is also important for accountability. Unfortunately, however, many organizations simply don't know for sure who has access to shared passwords. Far too often, the entire IT department knows the details of what is supposed to be a limited-access password.

All kinds of employees, from office administrators and temporary workers to nurses and civil servants require access to shared account logons for enterprise applications and systems for all kinds of reasons. IT managers, therefore, need to strike a balance between providing the flexibility required to meet end users’ needs and ensuring security and compliance with corporate policy and the latest industry regulations and legislation.

Use these tips to close the security gaps associated with shared password management as well as introduce a cost-efficient way for your organizations to comply with data protection and PCI DSS regulations that prohibit the sharing of accounts between users.


More Slideshows:

8 Essential Layers of Security for Every PC PC security starts at the edge of the network, and has to cover every entry point -- including the browser.

5 Password Rules Every User Should Follow Proper training for small and medium-sized businesses is critical, and this is especially true when it comes to proper security practices.

Symantec Hosted Services' Top 5 Security Threats Make sure you are prepared for these major security threats facing companies today.



 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.