10 Types of Unexpected Privileged Users

secure_computer_login_(Mobile).jpg

Companies are seeking to reduce their security risks in 2017, and a good place to start would be to look at the different users within your organization and their privileges.

Vendors represent one of the foremost examples of a privileged user. Organizations need to provide them a level of access to information systems, but can’t afford to simply turn over the keys to the entire network. Similarly, even when access is granted to a privileged user, a company needs to be able to monitor, evaluate and log when that access is being used and for what purpose. Bomgar’s own recent Vendor Vulnerability research revealed this—77 percent of respondents said they believe their company will experience a serious information breach within the next two years as a result of vendor activity on their networks.

But it’s not just vendors. Bomgar’s Sam Elliott explores the many different types of privileged user that can exist in a typical company in a new slideshow in Information Management, “10 People In Your Organization That Are Your Top Security Risks.

It’s been one of the most persistent frustrations in security—both IT and business leaders know they must provide added protection around these and other privileged users, but still allow them to do their jobs. Aside from the technology requirements, identifying and defining which individuals are privileged users is another problem. They simply lack the resources, personnel or control to keep on top of this critical security issue, leaving them vulnerable to either insider threats or malicious attacks from outside the organization.

For more details on the risks that vendors pose to organizations, and for solutions to mitigate such risks, download a free copy of the Vendor Vulnerability report. 

Elizabeth Hulsey is the Public Relations Specialist at Bomgar

Stay Up To Date

Get blog posts delivered directly to your inbox whenever we post! You may unsubscribe at any time.