Secure Remote Privileged Access for Your Vendors’ Technicians

Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.

“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“

Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”

Facts

  • Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.
Read on

A checklist for managing vendor network access

One nice thing about retail network security being front-of-mind is that more resources are popping up to help retail IT teams.  Over at his Front Line Sentinel blog, Matthew Pascucci has done a good job of walking through the steps retail network security pros need to take in managing vendor access.… Read on