A new book Least Privilege Cybersecurity For Dummies is available free electronically as well as in print. The new book from Thycotic, a privileged access management (PAM) product company provides IT people, as well as business users, with a primer on how to limit user and application access to privileged accounts – especially on endpoints – through various controls and tools, without impacting productivity, the firm says.
Joseph Carson, author and chief security scientist at Thycotic, said: “More than 80 percent of breaches involve compromised IT and business user credentials such as IDs and passwords. Because of this, organisations today are limiting privileged access to services, applications, data, and systems as a top priority.”
In many cases, users may not even realise the type of access they possess, the book points out. They only know that when access is denied and they can’t get their work done. Hackers and cybercriminals target these privileged accounts because once compromised, they give the ability to move across IT systems and networks undetected.
Written in the straightforward style of the Dummies franchise , the book helps guide IT people on the right path to eliminating overprivileged access by users, applications, and services.
James Legg, CEO at Thycotic said: “Companies are spending billions of dollars on cybersecurity, but hackers, cybercriminals, and disgruntled employees continue breaching computer systems, stealing sensitive information, or disrupting services. By limiting privileged access with application control, organizations can take a major step towards preventing these breaches from happening in the first place.”
To download a copy or to receive a hard copy, visit https://thycotic.com/resources/wileys-least-privilege-for-dummies/.