Bloomberg Anywhere Remote Login Bloomberg Terminal Demo Request


Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.


Financial Products

Enterprise Products


Customer Support

  • Americas

    +1 212 318 2000

  • Europe, Middle East, & Africa

    +44 20 7330 7500

  • Asia Pacific

    +65 6212 1000


Industry Products

Media Services

Follow Us

Bloomberg Customers

Protect Privileged Information from Trusted Insiders

Posted by: Today's Tip Contributor on January 26, 2010

According to a survey of U.S. security industry professionals, 14% of former company employees still have access to proprietary data and information—a fact that highlights critical deficiencies in company security policies. Once considered the exclusive worry of large enterprises, the proliferation of security incidents is forcing small- to midsized businesses to address vulnerabilities as well.

Whether looking at IT professionals, entrepreneurs, or employees, one thing is clear: There’s an overabundance of misappropriated access, especially when it comes to a company’s privileged, business-critical information. We’ve found that on average, companies have approximately three to five times the number of privileged accounts as they do employees, which makes managing passwords and access credentials a sizable challenge.

By taking these three simple steps, small business owners can employ a proactive approach to prevent breaches and protect vital information assets, avoiding the devastation and havoc that just one rogue employee can inflict.

1. Know who has access to privileged information. Assess who has access to what data so you can understand and manage access as appropriate.

2. Apply appropriate policies to protect sensitive information. Create an actionable plan and put it into place, applying privileged passwords and access management controls throughout each level of information.

3. Update security and access credentials regularly to monitor and maintain control. Implement a regimented program to automatically update access management and passwords so you can ensure that the right people have the right amount of control over critical information.

According to many research findings, data breaches perpetrated by insiders are approximately three times as expensive and harmful as external attacks. By adopting the right security practices, procedures, and tools, small businesses can better protect themselves, their IT systems, and their vital information.

Robert Grapes
Chief Technologist
Vienna, Va.

Post a comment



Want to improve the way you run your business? Entrepreneurs, academics, and consultants from diverse industries offer practical advice on a variety of topics each business day.

To submit a tip for consideration, first check our archive of previous tips to make sure you're not repeating a tip someone has already contributed. Then send the tip to Small Business channel contributor Michelle Dammon Loyalka. Because of the volume of material she receives, she may not respond to each individual.

BW Mall - Sponsored Links

Buy a link now!