{{item.title}}
Do you know who has access to what information, and when, how and whether they are authorised to do so? Do you know what your ‘crown jewels’ are and who should have access to these? Are you comfortable that only those who should have access to sensitive information do? If not, then there is a good reason to consider managing and governing your digital identities. Lack of Identity and Access Governance (IAG) not only increases the risk of unauthorised disclosure, misuse and/or loss of your organisation’s sensitive information, but may result in loss of productivity, reputational and financial damage and potential non-compliance with laws and regulations.
As the world becomes increasingly digitally driven, the barriers between the traditional workplace and the home are being eroded. As a result your organisation’s information is no longer housed on the business premises but is in the hands of your employees, third parties and customers who can access your information anytime, anywhere through a myriad of user devices and applications. The question is, how do organisations ensure that the right people have access to the left information at the right time?
Consequently, the approach to enterprise security and governance is shifting from perimeter-centric to identity-centric. Traditional methods of ensuring data confidentiality, integrity, availability and non-repudiation through legacy systems are fast approaching a state of extinction.
With an ever-changing technological landscape characterised by disruptive technologies such as cloud computing and mobile devices coupled with internal threats, securing the perimeter alone leaves your organisation with a half-baked solution. The physical perimeter is broken and insider activity continues to be a threat. The only possible solution is for organisations to manage and govern digital identities. The diagram to the right shows how the perimeter has been perforated by insider threats and disruptive technologies.
34% of respondents to PwC, CIO and CSO’s Global State of Information Security Survey 2018 said they are seriously planning to assess Internet of Things (IoT) risks across their environments. Mobile device exploitation, phishing and employees were rated the top three areas respectively where cyber incidents took place, while employees were the major likely source of incidents. Research firm Gartner places privileged account management (a part of Identity and Access Governance) as 2018’s top cybersecurity priority, given that over 80% of all breaches are a result of weak or stolen privileged credentials. According to CA Technologies’ 2018 Insider Threat Report, 90% of organisations feel vulnerable to insider threats and Verizon’s 2017 Data Breach Investigations Report reveals that an alarming 81% (up from 55%) of data breaches are as a result of stolen and weak credentials.