Great walls, lousy controls
Contractors and privileged users still roam much more freely in companies’ IT infrastructures than most will admit.
01 April 2011
It is said the Great Wall of China, built to keep invaders out of the kingdom, was effective until the invaders bribed the gate-keepers. These days, the biggest risk for insider fraud also emanates from those supposedly guarding a territory – the system administrators and other privileged users who wield the keys to a company’s IT.
Making matters even more interesting is the fact that privileged users with sweeping IT access are often third-party contractors, called in at busy times to relieve operational overload, or engaged to provide expertise the company needs for a limited period.
ITWeb Premium
Get 3 months of unlimited access
No credit card. No obligation.