Software
Is Your Static Account a Vulnerability?
Ever been told that a “Static” admin account is a vulnerability?
The Claim: if every technician has a unique account for every client site, domain, tenant, or local machine they … Read more “Is Your Static Account a Vulnerability?”
TechIDManager LAPS: LAPS at MSP Scale
TechIDManager LAPS is a significant improvement over Microsoft LAPS because we built it specifically for the needs of MSPs.
Before we delve into the specifics of TechIDManager LAPS, we … Read more “TechIDManager LAPS: LAPS at MSP Scale”
Password Rotation and PAM
Password rotation and privileged account management are two different approaches to enhancing the security of an organization’s IT systems. They are both needed.
Password rotation involves regularly changing passwords for … Read more “Password Rotation and PAM”
A Password Vault Is Not PAM
Privileged account management (PAM) and password management are two important security practices that can help organizations protect their systems and data. However, there are some key differences between the two. … Read more “A Password Vault Is Not PAM”
The ‘A’ In Your PAM; Access vs. Account Management
Only a small handful of PAM products are equipt to meet the needs of an MSP, and only one that addresses the need for the management of privileged accounts. Having … Read more “The ‘A’ In Your PAM; Access vs. Account Management”
Cyber Insurance Pivots
When filling out a cyber insurance application, it is critical the answer reflects the reality. When the reality is inconsistent with the answers on the application, the assumed coverage may … Read more “Cyber Insurance Pivots”
Mitigating Loss With Your PAM Tool
Another day, another breach, another downtime instance. Being a Managed Service Provider means being a target. As you provide more outsourced IT, the target grows. To address this, you bring … Read more “Mitigating Loss With Your PAM Tool”
Just In Time: Is Temporary Access The Remedy?
The cyber security needs of your clients are turning your attention toward how you can keep the keys to all their kingdoms (aka privileged accounts) safer. It can be difficult … Read more “Just In Time: Is Temporary Access The Remedy?”
Zero Trust With Accounts
When you have several users that decide to share their credentials out of convenience, how do you respond? You might educate them and possibly offer a remedy that replaces it … Read more “Zero Trust With Accounts”