Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.
“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“
Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”
- Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.