Click me
Transcribed

Privileged Accounts: The Cyber Attacker's All Access Pass

к ammand THE CYBER ATTACKER'S ALL ACCESS PASS Privileged Accounts: THE ANNUAL GLOBAL ECONOMIC TOLL of Cyber Attacks Cyber crime Up to $1 trillion in corporate losses Breaches due to cyber attacks $159 per capita in losses Security incident "clean up" Approx. $3.5MM per incident The United States alone may have lost more than a half-million jobs from cyber crime NO ONE IS SAFE "There are only two types of companies: those that have been hacked, and those that will be." - Former FBI Director, Robert Mueller Your Weakest Link Hiding in Plain Sight • Average attack 200+ days before detection • Attacks have remained undetected for as long as 7 years • Average monetary attack less than 30 days before detection Advancements in phishing have made employee logins far easier points of infiltration than network or software exploits PRIVILEGED ACCOUNTS: THE ATTACKER'S ALL ACCESS PASS ADMIN ****| This Pass May Be Used For: Privileged access to every IT system, application and end-user device ROOT ******** system-to-system with low risk of detection Fast and easy movement from Establishing multiple clandestine beachheads, making attackers harder to dislodge from networks ADMIN *******k* Deleting log data and other evidence II of illicit activity ROOT ******** THE PRIVILEGED ACCOUNT DISCONNECT Today's Reality The Real Threat ??????? of serious security Most organizations don't know how many privileged accounts they have or where they reside - making tracking and monitoring increasingly difficult 80% incidents involve TO privileged accounts, experts estimate 100% ********** Exploits of privileged The average organization has at least accounts are 3x to 4x widening and getting more sophisticated as many privileged accounts as employees 6 TIPS FROM THREAT INVESTIGATORS FOR STOPPING PRIVILEGED ACCOUNT EXPLOITS Know what privileged accounts you have and what they do. Then, limit privileges. Change default passwords and use different administrative passwords on each system. 3 4 Proactively protect privileged accounts and monitor their activity. Perform regular, recurrent "housekeeping" of information assets and how they are accessed. Apply patches as quickly Practice classic defense in depth. as possible. Securing privileged accounts is the new critical front line of defense for organizations committed to winning today's battle for cyber security. The trusted experts in privileged account security can help. Learn more in the CyberArk threat report, "Privileged Account Exploits Shift the Front Lines of Cyber Security" at www.cyberark.com/threat-report CYBERARK Security for the Heart of the Enterprise Sources: CyberArk Threat Report. "Privileged Account Exploits Shift the Front Lines of Cyber Security. November 2014. CyberArk Threat Report contributors: Cisco Talos Security Intelligence and Research Group Deloitte Financial Advisory Service LLP - Computer and Cyber Forensics Team Deloitte & Touche LLP - Cyber Risk Services Mandiant, a FireEye company RSA, the Security Division of EMC The Verizon RISK Team Cowley, Stacy. "FBI Director: Cybercrime Will Eclipse Terrorism." CNN Money. 2 March 2012. Center for Strategic and International Studies, sponsored by McAfee. "The Economic Impact of Cybercrime and Cyber Espionage." July 2013. Ponemon Institute, sponsored IBM. "The Economic Impact of Cybercrime and Cyber Espionage." May 2014. All monetary statistics are displayed in U.S. dollars (USD)

Privileged Accounts: The Cyber Attacker's All Access Pass

shared by CyberArk on Dec 02
71 views
1 shares
0 comments
The top global firms in cyber threat investigations have identified a common link in today’s most dangerous, targeted attacks and information security breaches: the exploitation of privileged accoun...

Publisher

CyberArk

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size