Page 84 - Cyber Warnings
P. 84
For example, say you restrict single sign-on logins to particular workstations, departments,
devices, IP addresses, times of day or geographies, organisations can reduce the size of the
opportunity for would-be attackers.
For example, if Chuck were using Larry’s credentials to log in from his own desktop, and the
company had restricted Larry’s logins to just his own devices, Chuck wouldn’t be able to gain
entry.
Or if someone in one department used the credentials from someone in another department to
gain entry from the wrong workstation, again, the system would deny access.
Context-aware technology has been around for a number of years but its popularity is growing
considering the need to better protect logins.
Some of the most devastating security breaches recently have occurred as a direct result of
compromised credentials, and with the growth of single sign-on popularity, the consequences of
compromised credentials are only set to get worse.
Context-aware security, therefore, is the equivalent of changing your wicker egg basket into a
virtually impenetrable thick iron box.
About the Author
François Amigorena is the founder and CEO of IS Decisions, a provider of
infrastructure and security management software solutions for Microsoft
Windows and Active Directory.
IS Decisions offers solutions for user-access control, file auditing, server and
desktop reporting, and remote installations.
Its customers include the FBI, the United Nations and Barclays who rely on IS Decisions to
prevent security breaches; ensure compliance with major regulations; such as SOX, FISMA and
HIPAA; quickly respond to IT emergencies; and save time and money for the IT department.
84 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide