What can admin users do when they have the keys to the kingdom?
Many, if not all organizations that I work with have been on a PAM journey of some description – some successful, some not so much, but all have had considerable investment along the way. In this blog, I want to explore the value-add of PAM, its principles, and ultimately the security posture delivered by the approach.
In the era of next-gen technology, it's the often-forgotten basics that provide the best foundations. By reducing the attack surface and building secure defensible endpoints you'll be in a far better position to stop cyber attacks and keep your data safe.
Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.
No longer will historic methods of blocking and protection be the only tenets of a security strategy, focus will be on next generation technologies and also detection and response.
Following on from last year, Avecto have analyzed Microsoft vulnerabilities in 2014 to reveal how the removal of admin rights is more important than ever.