Bomgar in the News

Avoiding Third-Party Access Pitfalls That Cause Security Risks

— What do many recent mega-breaches have in common? In most, hackers gained access to IT systems through a trusted third-party account, such as that of a vendor. A new Gartner report on remote privileged access for third-parties finds that nearly 75 percent of enterprises are significantly exposed to a cyber-attack due to unsafe privileged access processes. Two of 2015's mega-breaches—of health insurer BCBS Excellus and the U.S. Office of Personnel Management—show that the damage from these events can be long-lasting. But what can be done? Creating a virtual fortress around IT systems and networks won't likely offer an organization greater protection. Full Story

Hackers Put the Spotlight on Healthcare Vendors in 2016

— Moving into 2016, healthcare organizations will continue to be one of the most attractive targets for hackers. Last year, attacks against healthcare organizations were up 125 percent from 2010 and cost the industry $6 billion, according to the Ponemon Institute. As illustrated in the Anthem and Excellus Blue Cross Blue Shield data breaches, hackers are moving beyond phishing attacks and random malware drops, and adopting methods that are more sophisticated. Full Story

Bomgar Updates Privileged Access Management Platform

— Secure access solutions specialist Bomgar released the latest version of its Privileged Access Management solution, which enables security professionals to control, monitor and manage access to critical systems by privileged users and third-party vendors. Full Story

Securing data wherever it may be

— Data now resides on multiple devices in many locations. But is it out of control? Full Story

How fake users are impacting business … and your wallet

— Those fraudulent charges most of us have (hopefully) seen and corrected on our credit or debit cards are costing everyone a lot of money. Full Story

Speeding Up IT Support

— Valdosta State University in Georgia has achieved a 15-minute response time for second-tier information technology service — even while reducing costs. How? A new Technical Response Unit (TRU) program takes advantage of numerous technologies and operational changes to improve IT support on campus. Full Story

Bomgar Expands Data Management Solutions for Privileged User Access

— Bomgar, a provider of secure access solutions, has acquired password management technology from Pitbull Software, expanding Bomgar’s portfolio of Privileged Access Management solutions. The acquired Pitbull KeyHolder solution is used to secure, manage, and administer passwords for privileged users. Full Story

Managing Privileged Access Hacking Threats

— Amid increasingly common data breaches, it has become clear that hackers’ favorite targets are privileged account credentials, especially those of security, IT and database administrators. Since this information can give hackers access to critical systems without triggering any alarms, it is no wonder that this particular attack vector has been used time and time again, including in the major breaches at Excellus BlueCross BlueShield, the U.S. Office of Personnel Management and Target. Outside third-parties and vendors with privileged access are also prime targets because they often use legacy access methods that create unrestricted and unmonitored attack footholds in a network. Full Story

Unwelcome guests: hotel point of sale hacks spiraling

— Starwood Hotels & Resorts Worldwide has this month disclosed that malware designed to help cyber-thieves steal credit and debit card data was found on Point-Of-Sale (POS) systems at some of its hotels. POS systems – what consumers often call the checkout system – are often the weak link in the IT chain and the natural low-hanging fruit of choice for malware. Full Story

9 Ways Online Retailers Can Protect Customer Data Privacy During the Holidays

— A study conducted by KPMG last fall found that a growing number of consumers are leery of breaches and the loss of data privacy. As Forbes stated: More than a quarter (27%) of the 1,400 U.S. consumers surveyed in November by KPMG said they would only shop at a store that previously experienced a cyber attack if they could not find the product elsewhere — with 8% refusing to shop at these stores at all. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation