According to the latest Verizon Data Breach Investigations Report, 55% of insider threats are caused by privilege misuse. Employees may use entrusted privileges with a malicious intent, putting the organization at risk of financial and reputational losses.
This is why privileged identity management (PIM) should not be neglected when establishing a company’s security policy. To read more about the importance of PIM and to learn about four business reasons to deploy it, turn to the December issue of “Sysadmin Magazine”. In it, you will also find IT tips on how to increase corporate IT security and some practical knowledge about user activity monitoring, change management in Active Directory, file servers and Windows Server.
- Read about four business cases supporting the idea of privileged identity management
- Study useful how-to’s on detecting inactive users and finding out who has read a file on a file server
- Go through the tips from IT pros on how to ease Windows event log forwarding, implement two-factor authentication and create a working disaster recovery plan
Open the December issue of “SysAdmin Magazine” and become more informed on the latest IT security trends!