Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
It’s 2018. Password Journals are Still a Thing
It’s 2018. Password Journals are Still a Thing.
I was in a store the other day and saw something that, being in cyber security, stopped me fast: A Password Journal. Seriously. A place to write down passwords. The book even recommended using pencil so that when you change them, you can erase the old one.
It’s 2018. While I have not seen a password journal in an organization (yet), I have seen for myself at various companies (regardless of size), passwords on a sticky note, kept in a drawer or (gasp!) stuck to a monitor as solutions employees resort to, to remember all their logins and passwords.
There’s a better way.
I mean there has to be, right? For personal use, I wholeheartedly recommend a password manager like LastPass or Dashlane. I use the former but still occasionally run into trouble when I am on a different device (in a house of seven computers, three iPads, four Kindles, and five iPhones this can happen).
In an organization, however, the answer is more complicated: identity and access management (IAM). And with insider threats (that’s your employees) becoming one of the biggest vulnerabilities, IAM chatter is ubiquitous. From employee onboarding to updating to termination, access must be managed in a way that’s secure but easy enough to not get push back from that weak link.
What is it? Is it really necessary?
According to Wikipedia: “Identity management, also known as identity and access management is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons."”
IAM used to be just a supposedly simple IT ops function: Getting new employees access and removing that access when they leave or changing access if they transition roles. But that landscape has changed:
Let’s put IAM in layman’s terms. Joe Smith is an employee at company X who works in the HR department. He needs to access his email, spreadsheets, write documents and reference some folders in HR (but only certain ones). From his perspective IAM lets him get to what he needs, quickly after entering one password once. From a company perspective, Joe’s access is restricted to only what he needs which leads to more secure data. Plus, if Joe leaves the company, his access it cut off immediately, not weeks or months later (there’s another weak link). Sixty percent of internal data breaches were caused by privilege abuse where internal actors misused their level of granted access.
What’s the plan?
With all of the business drivers facing organizations today, IAM is becoming more and more important, and yet there are major hurdles.
How do you start? Fight to own IAM.
IAM plays a critical role in solving many issues keeping CISOs up at night. Here are just a few questions to ask.
IAM isn’t a one size fits all endeavor. It’s about lining up what you have already from personnel to hardware and software (some of it sitting on a shelf) and designing a path for integrating existing cyber security technologies putting IAM at the core of the strategy. It’s daunting but leads to better security at a weak point.
Let us know what you need, and we will have an Optiv professional contact you shortly.