IT Degree Insight: Three Steps IT Managers Can Take to Minimize Internal Risk
Study alongside Walden University students with this required reading taken from the MS in Information Technology course Computer Law, Crime, and Investigation.
Popular culture often depicts hackers as shady computer experts sitting in dark rooms. But the truth is a lot more pedestrian. While some cyber security threats come from the outside, a 2016 study found that 60% of cyber security breaches were carried out by people inside the organization being attacked.1 That means the biggest risk to your system is your own employees.
So, how do you stop threats coming from within? You can start by following the three steps laid out by cyber security expert Tom Kemp in his article, “Security’s Inside Jobs.”2 Kemp’s recommendations are so useful, they’re studied by Walden University MS in Information Technology students taking the course Computer Law, Crime, and Investigation.
Summarized from Kemp’s article, the steps are:
Don’t Use Shared Privileged Accounts
You should make sure every user granted privileged access to your system has their own account, rather than allowing all privileged users to log in to the same root account. This makes it easier to identify and terminate a specific user who’s abusing their access.
Limit What Privileged Users Can Do
Privileged users should only be able to do as much as they need to do to perform their jobs, and no more than that. Instead of giving all privileged users wide access, use a centralized authorization management system to limit each user’s access as much as possible.
Audit Privileged User Activity
Implement software that allows you to monitor everything each privileged user does within your system. In other words, trust but verify.
How Can You Learn More About Minimizing Security Risk?
Tom Kemp’s article “Security’s Inside Jobs” is just one of the many resources you can study in a course like Walden’s Computer Law, Crime, and Investigation. And that course is just one part of the university’s wider master’s in information technology degree program. Taken as a whole, the program is a great way to advance your knowledge and put yourself in position to elevate your career into information technology management.
Database administrators, computer programmers, software engineers, system administrators, systems analysts, and those in data analytics and other IT jobs can all benefit from an IT master’s degree. And, thanks to online learning, earning an advanced IT degree is more feasible than ever begore.
When you earn an MS in Information Technology degree online—or any other IT degree, like a Master of Information Systems Management (MISM) degree—you can complete your studies from home or anywhere else you have internet access. Plus, online education offers flexible scheduling, giving you the freedom to complete your coursework at whatever time of day works best for your life.
Cybersafety is of paramount concern to all IT professionals. With an advanced information technology degree, you can improve your ability to handle security issues—and many of the other issues that make IT careers as challenging as they are rewarding.
Walden University is an accredited institution offering MS in Information Technology and Master of Information Systems Management degree programs online. Expand your career options and earn your degree in a convenient, flexible format that fits your busy life.
Walden University is accredited by The Higher Learning Commission, www.hlcommission.org.