Skip navigation
Skip navigation
You are using an outdated browser. Please upgrade your browser.

A breach can wipe out company value – we saw it with Yahoo!’s acquisition price devaluation of $350 million and with Chipotle’s loss of $400 million

As National Cybersecurity Awareness Month ends today, Centrify encourages businesses to increase their Identity and Access Management maturity to effectively reduce the likelihood of a data breach

October 31, 2017 — Centrify, the leader in securing hybrid enterprises through the power of identity services, today shared seven best practices for enterprises to effectively defend their corporate assets from cyber adversaries. In today’s world of access, companies must increase their Identity and Access Management (IAM) maturity to effectively reduce the likelihood of a data breach.

A recently commissioned study conducted by Forrester Consulting found that two-thirds of organisations have been breached five times in the past two years. It’s clear that traditional approaches are not working, and companies need to completely rethink their security approach. Companies must employ IAM approaches as well as use integrated IAM technology platforms to reduce security risk in today’s boundaryless hybrid enterprise.

The Forrester study found that organisations without a mature IAM approach experience two times more breaches and $5 million more in costs than those with a mature IAM approach. The study examined four levels of IAM maturity, and found a direct correlation between a mature IAM approach and reduced security risk, improved productivity, increased privileged activity management and greatly reduced financial loss.

Below are a few best practices for enterprises to improve IAM maturity and reduce security risk:
• Consolidate identities: According to Verison, 80 percent of breaches are due to compromised credentials. It’s critical to develop a holistic view of all users and strengthen and enforce password policy, or eliminate passwords, where possible.
• Enable single-sign-on (SSO): SSO to enterprise and cloud apps, combined with automated cloud application provisioning and self-service password resets, cuts helpdesk time and cost, and improves user efficiency.
• Implement multi-factor authentication (MFA) everywhere: MFA, including third parties and the VPN that adapts to user behavior, is widely acknowledged as one of the most effective measures to prevent threat actors from gaining access to the network and navigating to target systems.
• Audit third party risk: Outsourced IT and third party vendors are a preferred route for hackers to access corporate networks. Conduct audits and assessments to evaluate the security and privacy practices of third parties.
• Enforce least-privilege access: Role-based-access, least-privilege and just-in-time privilege approval approaches protect high value accounts, while reducing the likelihood of data loss from malicious insiders.
• Govern privileged sessions: Logging and monitoring of all privileged user commands makes compliance reporting a trivial matter and enables forensic investigation to conduct root cause analysis.
• Protect the inside network: Network segmentation, isolation of highly sensitive data and encryption of data at rest and in motion provide strong protection from malicious insiders and persistent hackers once inside the firewall.

“A breach can wipe out company value – we saw it with Yahoo!’s acquisition price devaluation of $350 million and with Chipotle’s loss of $400 million in shareholder value after their breaches were announced. The stakes for properly securing access to corporate resources and handling security incidents couldn’t be higher,” said Bill Mann, Chief Product Officer at Centrify. “In fact, a recent Ponemon research study found that stock prices fall an average of five percent, customer churn can increase as much as seven percent and brand reputation is tarnished after a data breach is disclosed. In order to avoid financial and reputational ruin, organisations must rethink their traditional endpoint and firewall security approach and add identity security into their arsenal against cyberattacks.”

About Centrify

Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognised leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organisations. To learn more visit www.centrify.com.
The Breach Stops Here.

###
Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

For further information contact:
Louise Burke
Origin Communications
louise@origincomms.com
Tel: +44 (0) 7917 176095

This press release was distributed by ResponseSource Press Release Wire on behalf of Origin Comms Ltd in the following categories: Consumer Technology, Business & Finance, Computing & Telecoms, for more information visit https://pressreleasewire.responsesource.com/about.