MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Privileged account abuse signs to watch for devolutions blog

Privileged Account Abuse: Who’s Doing It, Signs to Watch For & How to Reduce the Risk

Users with privileged account access are given “the keys to the kingdom” — or at least the keys to valuable floors and rooms in the kingdom — so they can be more productive and efficient while carryin...

Users with privileged account access are given “the keys to the kingdom” — or at least the keys to valuable floors and rooms in the kingdom — so they can be more productive and efficient while carrying out their day-to-day tasks. Unfortunately, privileged users are also prime targets for hackers who want to breach devices and networks, and ultimately steal data. In fact, a survey by Centrify found that 74% of data breaches are triggered by privileged account abuse.

The Enemies Within

What’s more, not all users with privileged account access are responsible and compliant. There are generally four kinds of insiders who unknowingly and knowingly cause privileged account abuse:

The Accidental Leaker

These users don’t mean to cause harm, but due to ignorance or carelessness they fall victim to phishing emails, social media posts, and texts.

The Compromised Insider

These users have their identity and/or device compromised. As mentioned, hackers are aggressively targeting users with privileged access, such as sysadmins, network engineers, database administrators, etc.

The Disgruntled Worker

These users — who can be employees, contractors, consultants, vendors, or anyone else with privileged access — have a grievance with the company and seek revenge by inflicting damage. They typically aren’t motivated by personal financial gain.

The Double-Agent

These users pretend to be compliant, but behind the scenes they’re stealing data for profit. Left unchecked, they can carry out their illicit activities for years.

Signs of Privileged Account Abuse

All organizations need to be concerned with privileged account abuse, including small businesses, which are now considered “ground zero” for cyber crime. Here are some key signs to watch for:

Also keep in mind that while most hackers aren’t the cyber geniuses depicted in movies, they aren’t stupid either. For example, they will often run little tests to see if their presence is detected. They will also create accounts and add them to high-privileged groups, and then wait weeks or months before accessing them.

How to Reduce the Risk of Privileged Account Abuse

Here are some tips to secure the privileged account landscape and reduce the risk:

How Devolutions Helps

In addition to the above strategies and policies, Devolutions’ suite of solutions can help organizations effectively and affordably reduce the risk of privileged account abuse:

From the Desk of Our CISO Martin Lemay:

The abuse or compromise of a privileged account usually results in havoc. Hours, days, months, and years of effort and money can be invested in preventing such a situation. However, no security professional will claim 100% security and, therefore, there is always the possibility that such a scenario will happen. This is why all organizations should prepare for the worst and apply the following guidelines on top of the tips previously stated:

These simple recommendations can greatly reduce the impact of a compromised or abused privileged account by leveraging fast containment of threats and speeding up secure recovery of operations. Combined with the tips enumerated in the “How to Reduce the Risk of Privileged Account Abuse” section, organizations will be in better shape to prevent, detect, respond to, and recover from privileged account abuse or compromise.

The Bottom Line

The bad news is that as long as there are privileged accounts, there will be the risk of privileged account abuse. There is no way to 100% eliminate this possibility, just as there is no way to 100% eliminate cyber threats like malware, viruses, ransomware, worms, and the list goes on.

But the good news is that organizations can — and frankly, must — be proactive in reducing the risk of being victimized by external hackers and internal rogue users. After all, with great privilege comes great responsibility!

More from Security

Read more articles