Yet Another Way To Be Hacked


Posted on
Categories Network Security

Please take a moment to read this excerpt from InfoSecurity magazine’s latest issue:

“A global study indicates that disgruntled former employees (or threat actors taking advantage of them) have a widespread opportunity to cause harm within companies-because their IT accounts remain active, often months after they leave their jobs.
One of the easiest ways for malicious outsiders, or even insiders, to gain access into an organization’s IT network is by stealing user credentials such as user names and passwords. Once access is secured, a series of lateral movements and privilege escalation activities can procure access to the type of information and systems that are most coveted by bad actors, such as a CEO’s email, customer or citizen personally identifiable information or financial records.”

This is only one of the multitude of ways that your technology platform can be penetrated, and your organization can be harmed or even destroyed.

If you don’t have a comprehensive network security audit performed every quarter, NOW IS THE TIME TO START. Please, please don’t wait until it is too late.  Call Sentry today!