Edward Snowden is the world's most famous rogue employee. A former NSA contractor who stole highly secretive information and disclosed it to the media, the ramifications of which seem to have no end, the case Snowden might seem like an extreme example - but employees going rogue is not all that uncommon within organisations.
Large organisations typically have thousands of privileged accounts, which are often left unmanaged. Once a hacker accesses a password through one of these internal or external attack vectors, the intruder can leapfrog from system to system, compromising privileged accounts throughout the organisation until the IT infrastructure is mapped and its most valued information can be extracted at will.
Rogue insiders, former employees, criminal hackers and sophisticated state-sponsored attackers can exploit these unmanaged privileged accounts to anonymously access and extract an organisation's most critical data.
In this article, we count down the most common attack vectors, so you can be prepared.
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.