New Book Provides Starting Point for IT Professionals Seeking to Limit and Control Privileges on Servers, Applications, Endpoints and More
WASHINGTON, D.C., January 15, 2019 — Thycotic, provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced the release of its new book Least Privilege Cybersecurity For Dummies – available free electronically as well as in print. The new book provides IT professionals, as well as business users, with a primer on how to limit user and application access to privileged accounts – especially on endpoints – through various controls and tools without impacting productivity.
“More than 80 percent of breaches involve compromised IT and business user credentials such as IDs and passwords,” said Joseph Carson, author and chief security scientist at Thycotic. “Because of this, organizations today are limiting privileged access to services, applications, data, and systems as a top priority.”
In many cases, users may not even realize the type of access they possess. They only know that when access is denied and they can’t get their work done. Hackers and cybercriminals target these privileged accounts because once compromised, they give the ability to move across IT systems and networks undetected.
Written in the straightforward style that the Dummies book franchise is known for, the book helps guide IT professionals on the right path to eliminating overprivileged access by users, applications, and services. It’s an ideal starting point for gaining:
- An understanding of the basic concepts of least privilege cybersecurity
- Knowing the key steps to planning a least privilege cybersecurity strategy
- Seeing how to apply least privilege with application control to reduce risk without impacting productivity
“Companies are spending billions of dollars on cybersecurity, but hackers, cybercriminals, and disgruntled employees continue breaching computer systems, stealing sensitive information, or disrupting services,” said James Legg, CEO at Thycotic. “By limiting privileged access with application control, organizations can take a major step towards preventing these breaches from happening in the first place.”
Download a copy of the Least Privilege Cybersecurity for Dummies book here.
*** This is a Security Bloggers Network syndicated blog from Thycotic authored by Jordan True. Read the original post at: http://feedproxy.google.com/~r/Thycotic/~3/U9Es4YrUQtA/