SANTA CLARA, Calif.--(BUSINESS WIRE)--Centrify, the leader in securing enterprise identities against cyberthreats, today shared seven tips for enterprises to effectively combat cybercrime. Employee training and cyber awareness, combined with a solid defense strategy and best-in-class cybersecurity tools and software, are essential to reducing the risks of data breaches.
In the modern age, cyber safety is just as important as physical safety. It’s time for every organization to get proactive with cybersecurity, because every organization is vulnerable to attack. Cyber risk is present at every level in every company from the break room to the board room. And according to Ponemon’s 2016 Cost of Data Breach Study, the average cost of a data breach is $4 million.
Below are a few best practices for enterprises to effectively combat cybercrime, while reducing IT security budgets:
- Consolidate identities: Sixty-three percent of data breaches involve weak, default or stolen passwords, according to Verizon’s 2016 Data Breach Investigation Report. It’s critical to develop a holistic view of all users and strengthen and enforce password policy, or eliminate passwords, where possible.
- Audit third party risk: Outsourced IT and third party vendors are a preferred route for hackers to access corporate networks. Conduct audits and assessments to evaluate the security and privacy practices of third parties.
- Implement multi-factor authentication (MFA) everywhere: MFA, including third parties and the VPN that adapts to user behavior, is widely acknowledged as one of the most effective measures to prevent threat actors from gaining access to the network and navigating to target systems.
- Enable single-sign-on (SSO): SSO to enterprise and cloud apps, combined with automated cloud application provisioning and self-service password resets, cuts helpdesk time and cost, and improves user efficiency.
- Enforce least-privilege access: Role-based-access, least-privilege and just-in-time privilege approval approaches protect high value accounts, while reducing the likelihood of data loss from malicious insiders.
- Govern privileged sessions: Logging and monitoring of all privileged user commands makes compliance reporting a trivial matter and enables forensic investigation to conduct root cause analysis.
- Protect the inside network: Network segmentation, isolation of highly sensitive data and encryption of data at rest and in motion provide strong protection from malicious insiders and persistent hackers once inside the firewall.
“There is no magic answer to defeating cyberthreats, but with the right strategy, strong security policy and active engagement of all employees, the risk of a cyberattack can be drastically reduced,” said Bill Mann, Chief Product Officer at Centrify. “By following the above steps, organizations can reduce cyber risk, improve corporate compliance and gain cost efficiencies.”
Centrify is the leader in securing enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts. Centrify delivers stronger security, continuous compliance and enhanced user productivity through single sign-on, multi-factor authentication, mobile and Mac management, privileged access security and session monitoring. Centrify is trusted by over 5000 customers, including more than half of the Fortune 50.
Centrify is a registered trademark and Centrify Server Suite, Centrify Privilege Service and Centrify Identity Service are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.