IT disaster recovery, cloud computing and information security news

Seven tips to reduce data breach risks via IAM

Centrify has shared seven best practices for enterprises to effectively defend their corporate assets from cyber adversaries through increasing their identity and access management (IAM) maturity to effectively reduce the likelihood of a data breach.

A recently commissioned study conducted by Forrester Consulting found that two-thirds of organisations have been breached five times in the past two years. The study also found that organizations without a mature IAM approach experience two times more breaches and $5 million more in costs than those with a mature IAM approach. The study examined four levels of IAM maturity, and found a direct correlation between a mature IAM approach and reduced security risk, improved productivity, increased privileged activity management and greatly reduced financial loss. 

Below are the seven best practices for enterprises to improve IAM maturity and reduce security risk: 

  • Consolidate identities: According to Verison, 80 percent of breaches are due to compromised credentials. It’s critical to develop a holistic view of all users and strengthen and enforce password policy, or eliminate passwords, where possible.
  • Enable single-sign-on (SSO): SSO to enterprise and cloud apps, combined with automated cloud application provisioning and self-service password resets, cuts helpdesk time and cost, and improves user efficiency.
  • Implement multi-factor authentication (MFA) everywhere: MFA, including third parties and the VPN that adapts to user behavior, is widely acknowledged as one of the most effective measures to prevent threat actors from gaining access to the network and navigating to target systems.
  • Audit third party risk: Outsourced IT and third party vendors are a preferred route for hackers to access corporate networks. Conduct audits and assessments to evaluate the security and privacy practices of third parties.
  • Enforce least-privilege access: Role-based-access, least-privilege and just-in-time privilege approval approaches protect high value accounts, while reducing the likelihood of data loss from malicious insiders.
  • Govern privileged sessions: Logging and monitoring of all privileged user commands makes compliance reporting a trivial matter and enables forensic investigation to conduct root cause analysis. 
  • Protect the inside network: Network segmentation, isolation of highly sensitive data and encryption of data at rest and in motion provide strong protection from malicious insiders and persistent hackers once inside the firewall.

www.centrify.com



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

   

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.