Reducing Insider Threats with Automation.
IT risk is measured by the probability of occurrence and consequence by exploiting a particular vulnerability. GateKeeper Proximity is crucial to those dealing with IT risk management. Many insider threats originate in opportunism. A study by Accenture found that 21 percent of healthcare employees write down their user names and passwords on paper near their workstation. 18% said they were willing to sell information for money.
A key method in preventing more opportunities for insider threats is to reduce risk windows. One of the greatest risks is unlocked and unattended computers. This is a violation in many compliance mandates such as HIPAA, CJIS, DFARS, and most corporate security policies. To prevent unlocked computers, GateKeeper automatically locks computers when users leave - preventing local access to passwords and other gateways available through an unlocked computer.
How to setup GateKeeper Proximity.
For any additional questions or concerns regarding IT risk management, cybersecurity, proximity settings, computer locking, credential management, or compliance, please contact GateKeeper Enterprise support using the Support Ticket form on https://gkaccess.com/support/ or email support@gkaccess.com.
---------------
infosecurity; cybersecurity; infosec; cyber security; information security; protect enterprise system; Network security; unlocked computers; weak passwords; vulnerabilities; insider threat; data leak; data loss prevention; risk management; risk assessment; cyberrisk; cyber risk; fight cyber crime; cyber espionage; defense in depth; security hardening; security policy; security risk; information technology security; SOC; SIEM; IP theft; security ops center; combating threats; insider breach remediation; costs of IT problems; cost of a breach; risks from insiders; proximity locking mechanism; prox lock; proximity locking system; proximity locking solution; reduce IT risk; how to reduce IT risks; reducing IT risks; how to prevent IT risks; lock computers automatically; compliance solutions for computers; authentication risk prevention;
Comments
0 comments
Please sign in to leave a comment.