Digital Transformation Through Agile Delivery
IT Agility AbilityTM
Digital Transformation Through Agile Delivery
IT Agility AbilityTM

‘Watching The Watchers’ this weeks Cyber Insights from The National Cyber Skills Centre

By . December 20, 2018
Within your IT department, assuming you have one, somebody has access to everything. All the emails. All the financial systems. All the document stores. All the contracts. All the suppliers details. All the HR records. All the passwords. Do you know who that is? And do you know exactly what access they have? And when did they last use that access? And for what reason? This individual, or individuals are referred to as privileged users and according to CESG (the information assurance arm of GCHQ), they are one of the top 10 cyber risks to your business.

You have seen the movie, where a good guy goes rogue. They had access to privileged information, usually of national importance and through a set of circumstances uses this information against their former colleagues to obtain some form of gain – financial or otherwise. Now depending on what side you are on this can be a good thing or a bad, but for the sake of argument, we will stick with it being a bad thing to happen. You don’t have to look far for real world examples of this occurring, does the name Edward Snowden mean anything to you? Of course, it does, he had access to information and then used it against his former employers. Was his access privileges checked? I’m guessing not.

Who inside your organisation is a ‘privileged user’ and do you know what they can do?... 

 

Read more over at Cyber Insights, brought to you by the National Cyber Skills Centre.

 

Certes specialise in IT staffing for all sectors and industries. We are now working with the National Cyber Skills Centre in order to provide staffing to companies in need of cyber security. For cyber security jobs Click here.

Strategies

Sectors

Who We Work With