You are in: Articles / Security / 6 tips for guarding against rogue sys admins
 
 
 

6 tips for guarding against rogue sys admins

(Carolyn Duffy Marsan, NetworkWorld) One of the biggest threats that organizations face is losing sensitive data - such as payment card or personally identifiable information about customers or employees - to theft from their own employees. The threat is greatest from systems and network administrators, who have privileged access to vast amounts of corporate data and are responsible for most compromised records in insider cases.

Heather Wyson, vice president of the fraud program at the BITS Financial Services Roundtable, says there has been an increase in insider incidents among U.S. financial services firms.

We spoke with CISOs and IT security experts about what practical steps IT departments can take to minimize the insider threat. Here's their advice:
1. Restrict and monitor users with special privileges
2. Keep user access and privileges current, particularly during times of job changes or layoffs
3. Monitor employees found guilty of minor online misconduct
4. Use software to analyze your log files and alert you when anomalies occur
5. Consider deploying data-loss prevention technology
6. Educate your employees about the insider threat

 
 
|
|
Rating: 12345
 
Leave a comment



Note: all fields marked with (*) are required
Comments (0)
 
Close send to email window
 



Verification code

Already a member?
Blacklist monitoring alerts
sign up Signup for our real-time monitoring service and receive email notifications each time one of your IPs gets blacklisted.
Free Signup
Mail Server Operating System Poll
.01

What OS do you use for your email server?
Linux
Windows
Other
disabled next
.02

How many mailboxes do you currently manage?
1-50
51-300
300+
previous next
.03

Would you like to comment upon the choosing of this particular OS?

previous
 
DNS Tools
Get IP status, owner and location, obtain its corresponding hostname or check specific ports.
Ping Statistics
Reverse DNS Lookup
Whois Info (IP owner)
GeoIP Information
Check Port
Open Relay Test
Test if your mail server is an open relay for spammers.
Blacklist Checker
Check if your IP is listed in DNS based email blacklists (DNSBL)