How to tackle human threat through identity management

By Richard Dornhart, National Security Practice Mananger, Data#3

[Reading time: 1 min]

I recently came across a very interesting article discussing how identity management can be key to protecting your company from cybersecurity breaches. It’s critical that companies need to know who has access to their applications and systems at every stage.

The article states that last year, 1,400 data loss events took place, releasing 169 million records, predominately as a result of somebody within a company doing something he or she was not supposed to do. When you consider the fact that globally, companies could potentially be managing over a billion points of data access, it’s easy for any organisation, large or small, to suffer from security breaches.

Personally, I agree that network security alone is no longer sufficient, and that hackers are using more sophisticated techniques for breaking through our existing security defences.

Security strategies need to focus on the human element within an organisation. Businesses need to secure user identities by developing an identity management strategy that manages identity at all levels within an organisation. Only then will you know who has access to what.

A good read for technology executives looking to protect their most important information can be found here – http://www.information-age.com/technology/security/123461173/how-understand-human-threat-through-identity-management

Tags: Cybersecurity, Identity Management, Network Security, Security



JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…

Delivering the Digital Future, Securely – for Western Australia
Delivering the Digital Future, Securely – for Western Australia

Data#3, proudly sponsored by Cisco, Microsoft and Palo Alto Networks, are pleased to present to you: Delivering the Digital Future,…