Skip to main content

Cyber Security Day #7 Managing User Privileges

By 19th November 2015Italik News

user-privileges

Are you sure that all of the users on your system have the correct access privileges? Have you removed access rights for leavers?

According to the IBM Cyber Security Intelligence Index, 55% of security attacks originate from data thieves with access rights.

It is good practice for an organisation to manage the access privileges that users have to an Information and Communications Technologies (ICT), the information it holds and the services it provides. All users of ICT systems should only be provided with the privileges that they need to do their job. This principle is often referred to as ‘Least Privilege’. A failure to manage user privileges appropriately may result in an increase in the number of deliberate and accidental attacks.

Italik can help you to:

  • Review and pro-actively manage user access rights in Active Directory
  • Report on groups and nested group memberships
  • Remove redundant users and groups
  • Implement policy based user access control and authentication
  • Assess user profiles and posture
  • Provide user request and data owner authorisation

 

Leave a Reply

Service Desk Engineer

Job Description:

  • Provide first point of contact to Italik customers primarily
    onsite but also remotely for infrastructure support. 
  • Work as part of a team to deliver IT Support to our
    customer database under the guidelines of ITIL.
  • Assist on project work where required under the guidance
    of the Project Manager. 
  • Ensure customers are provided with quality support.

Leave Us Your Details

Complete the form below and one of our experts will be in touch shortly.