Beruflich Dokumente
Kultur Dokumente
9 in 10 Hackers
45% of Hackers
94% of Hackers
The takeaway from this years Hacker Survey is clearly expressed by cybersecurity expert
Dave Shackleford of IANS:
Its imperative that organizations start implementing best practices to protect privileged account access
around the sensitive credentials most sought after by attackers today. This report contains several best
practices organizations can use to protect their privileged accounts, enforce stronger security policies
and stop a breach in its tracks, including:
PRIVILEGED
ACCOUNT
MANAGEMENT
p: +1 202-802-9399
e: sales@thycotic.com
www.thycotic.com
Only 6% of hackers have NOT found privileged account credentials in unprotected files.
Given the relative value of personal health information (PHI) to hackers, in contrast with credit card
numbers, healthcare organizations are at the top of the list when it comes to targeted industries. The
hackers surveyed at Black Hat also indicated that healthcare is the industry that seems the most
vulnerable to them as well. When asked which industry (among healthcare, financial services,
government, oil and gas/energy, and education) they considered healthcare be the ripest target for
breach vulnerability healthcare was the leading answer of 29% of all respondents. Financial services
and government followed closely though, garnering 25% and 24% respectively. Interestingly, despite the
various reasons that hackers might target oil and gas/energy concerns such as hacktivism, terrorism,
or simply financial gain only 1 in 10 respondents considered that industry to be the most vulnerable to
breaches.
Recommendations
As a mandatory response for the continuing trend of credential theft and privileged account abuse
regardless of current security spends, its imperative that organizations begin practicing some level of
privileged account management and access management around the sensitive credentials most sought
after by attackers today. Privileged account management is a segmentation of IT security that securely
discovers, controls, and manages privileged account passwords and access to those accounts. As the
data shows, hackers are not going to stop targeting these credentials any time soon.
Below are some best practices for organizations to protect privilege accounts, enforce stronger security
policies and stop a breach in its tracks.