• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Orphaned Account Risk Underestimated, Symark Says

    May 27, 2008 Alex Woodie

    A survey commissioned by Symark International found a disturbing level of management ignorance concerning orphaned accounts, or user accounts that remain active after an employee has left a company. The survey suggest that one in three organizations has little knowledge or control over orphaned accounts, which increases the risk of a disgruntled former user compromising an organization’s security.

    Symark’s survey of 850 IT, C-level and HR executives, which was conducted earlier this year by eMediaUSA, examined the prevalence of orphaned accounts in the enterprises, and the processes the enterprises have in place to locate and terminate them.

    Here are some of the more alarming results from the survey on orphaned accounts:

    • 42 percent of respondents said they do not know how many orphaned accounts exist within their organization
    • 30 percent said they have no procedure in place to locate orphaned accounts
    • 30 percent said it takes longer than three days to terminate an account after an employee or contractor leaves the company, while 12 percent said it takes longer than one month to do so
    • 38 percent of respondents said they had no way of determining whether a current or former employee used an orphaned account to access information
    • 15 percent said a former employee has used an orphaned account to access information at least once.

    The results highlight the very real threat that inside users–as opposed to hackers outside an organization–pose to organizations, according to Bob Farber, CEO of Symark. “By now, most security professionals understand that a vast majority of data breaches involve some sort of insider impropriety,” he says. “However, the threat from within continues to remain a major hurdle, largely due to the sheer number of avenues available to an employee to carry out malicious activity.

    “As the sobering results of this study demonstrate, orphaned accounts represent a major security and compliance challenge and are often overlooked as a potential threat vector,” Farber continued. “It is clear that organizations must implement polices and technologies to ensure that user accounts are terminated swiftly as soon as the employee leaves the company, especially for large, international enterprises managing locations across the globe.”

    Symark, as you might have guessed, develops a line of software that sheds light on user accounts and the access these accounts give them within large organizations running a mixture of different platforms. The company’s flagship product, PowerBroker, implements a series of processes around the use of powerful user profiles. Symark offers similar capabilities for i (formerly i5/OS) with PowerKeeper.

    RELATED STORY

    Symark Tackles Tough Access Control Problems



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    Free NGS-IQ Webinar: A Better Way to Connect IBM i Data and Microsoft 365 Users.

    Business users rely on Excel, SharePoint, Access, and other Microsoft tools to view, analyze, and share data. But what if your data is too sensitive and complex to simply open up to non-technical users via ODBC and Microsoft 365’s query functions?

    Attend our webinar on June 22, 2022, and see how you can make the people you support smile even as you centrally manage and secure IBM i data access.

    www.ngsi.com– 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    COMMON:  Join us at the Focus 2008 workshop conference, October 5 - 8, in San Francisco, California
    Help/Systems:  Explore operations automation and BI, June 17 - 20, 2008, Minneapolis, MN
    Vision Solutions:  System i Management Tips Blog - Free i5/OS Tips Each Week!

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Admin Alert: Monitoring the Monitors More Power Transitions Are on the Way

    Leave a Reply Cancel reply

Volume 8, Number 21 -- May 27, 2008
THIS ISSUE SPONSORED BY:

ProData Computer Services
Aldon
Maximum Availability
Safedata
RJS Software Systems

Table of Contents

  • Paglo Aims to be the Google of IT Management
  • RPG Programmer Avoids ‘Learn Java or Flip Burgers’ Pitfall
  • Lieberman Adds i OS Support to Password Program
  • KST Offers DataTrigger to Protect DB2/400 Files
  • Kisco Clamps Down on FTP Exposure with SafeNet/400
  • Love’s Likes CCSS for PCi
  • Orphaned Account Risk Underestimated, Symark Says
  • Pepsi Bottler Uncorks Application Modernization with looksoftware
  • JDE EnterpriseOne Certified for i 6.1
  • Manufacturer’s JDE System to Be Extended with SM-Plus

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp Brings IBM i Base Back Together in the Big Easy
  • New Nav for i Brings New Stuff to You
  • Why Infor’s IDF Is Important for Customer Innovation
  • Four Hundred Monitor, May 25
  • IBM i PTF Guide, Volume 24, Number 21
  • How Committed Is Big Blue To The IBM Cloud?
  • Immutable Copies Are Only As Good As Your Validation
  • Guru: IBM i *USRPRF Security
  • ERP Transitions Loom for SAP on IBM i Customers
  • Inflation Pumps Up Global IT Spending, Supply Chain Deflates It

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.