How to tackle human threat through identity management

By Richard Dornhart, National Security Practice Mananger, Data#3

[Reading time: 1 min]

I recently came across a very interesting article discussing how identity management can be key to protecting your company from cybersecurity breaches. It’s critical that companies need to know who has access to their applications and systems at every stage.

The article states that last year, 1,400 data loss events took place, releasing 169 million records, predominately as a result of somebody within a company doing something he or she was not supposed to do. When you consider the fact that globally, companies could potentially be managing over a billion points of data access, it’s easy for any organisation, large or small, to suffer from security breaches.

Personally, I agree that network security alone is no longer sufficient, and that hackers are using more sophisticated techniques for breaking through our existing security defences.

Security strategies need to focus on the human element within an organisation. Businesses need to secure user identities by developing an identity management strategy that manages identity at all levels within an organisation. Only then will you know who has access to what.

A good read for technology executives looking to protect their most important information can be found here – http://www.information-age.com/technology/security/123461173/how-understand-human-threat-through-identity-management

Tags: Cybersecurity, Identity Management, Network Security, Security



Protecting Data in a Cloud World: What You Need to Know About Azure Backup

Welcome to Part 1 of our 3-part blog series, exploring data protection options and considerations for when you’re operating in…

The Southport School Revisited
The Southport School: Four Years On

How have their investments in wireless networking and security paid off after four years? Download Customer…

Palo Alto Security Growth Partner of the Year
Data#3 Triumphs with Palo Alto Networks Security Award

November 11, 2022; Sydney, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Delivering the Digital Future, Securely

Cyber security challenges continue to evolve, compliance obligations increase and skills shortages stress your teams – what if we could…

ACSC Essential Eight Maturity Model: Regular Backups
Essential Eight Maturity Model: Regular Backups

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

Data#3 Named Global Cisco Security Partner of the Year
Data#3 Accomplishes Five Year Winning Streak – Named 2022 Global Security Leader

November 02, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Blog - Network Visibility and Authentication
Network visibility and authentication: Your school’s cyber security superpowers

When it comes to cyber security, schools need to be as vigilant as any business. After all, they deal with…

Aruba EdgeConnect SD-WAN Security
Evolving your SD-WAN security for a cloud-first world

Traditional SD-WAN security has consisted of encryption and IPsec tunnels with support for VPNs and stateful firewalls – but…