Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credentials are at the heart of most all modern attacks and breaches. Attackers can easily obtain credentials via phishing attacks, brute force, keyloggers, pass-the-hash techniques, or using a database of previously stolen credentials. And once an account is compromised, the attacker can see and do anything that is allowed for that user or account.
The post 6 Tips for Securing Privileged Accounts in the Enterprise appeared first on Security Boulevard.
from 6 Tips for Securing Privileged Accounts in the Enterprise
No comments:
Post a Comment