Privileged credential abuse is one of the most popular breach strategies organized crime and state-sponsored cybercrime organizations use. 74% of IT decision makers surveyed whose organizations have been breached in the past say it involved privileged access credential abuse, yet just 48% have a password vault. These and many other insights are from Centrify’s recent survey, Privileged Access Management in the Modern Threatscape . Strategies For Stopping Privileged Credential AbuseThe following are five strategies CIOs need to concentrate on to stop privileged credential abuse. In Part 1 of a CIO’s Guide to Stopping Privileged Access Abuse, below are the steps they can take to get started:Discover and inventory all privileged accounts and their credentials to define who is accountable for managing their security and use.
Source: Forbes April 15, 2019 20:03 UTC