IT Security Measures Take Many Forms

By | Jun 13, 2013

IT administrators take business security seriously. They are always on the lookout for elements within a business that are behaving in odd ways and taking measures to secure business assets so they operate in the desired manner. One asset that is the most difficult to manage is the individual. At the right hand of every access point to business resources is an individual who will attempt to enter. An employee is a complex machine, so admins must implement special IT security measures to deal with the safety of said access points.

Admins can monitor individuals and their relationships with each other through advanced software provided by IBM. Through data related to each individual and group, admins can bolster security by identifying any subversion created from within or outside their respective organizations. They can quickly resolve any subversion or access hazards such as identity theft.

Monitoring the Individual

As an initial example, suppose a midsize firm has a server which is running a virtual machine. This virtual machine contains a database that consists of financial figures relevant to the firm. It is reasonable that some individuals should have access to the database, such as accountants. Each person who is accessing that information will pass security clearance, initially, by providing credentials such as a name and pass-phrase. Yet, admins can learn much more information about each individual in this situation.

Once an accountant, for instance, has access to the database as a whole, he may be given read and write access to a specific part of the database. Advanced monitoring software can take advantage of information associated with the accountant - such as his name, identification number, and/or type of security clearance - and pair that with the database alterations he is making today, while also comparing them with alterations he made in previous days and weeks.

Monitoring the Group

Further, admins can monitor access to this database on a group level. Information learned about one individual may not be enough to discover an impending security breach, but admins can gain valuable insight by comparing the behavior of several individuals. If, for instance, an IT admin notices that multiple individuals have altered the same part of the database on successive days for several weeks, the admin might assume it is suspicious. In fact, the repetitive behavior could indicate that a single individual is using multiple company identities for malicious purposes.

This individual, which admins could discover with IBM software like Infosphere Identity Insight, could be anyone - from an employee to an outside entity. In the example above, the IBM software provided a necessary service by helping an admin pinpoint a behavior-related red flag, which can be resolved both through continued monitoring and confrontation of any known individuals that may be involved. Ultimately, any admin in this situation would have helped to save his or her midsize business potential headaches and asset losses with the use of enhanced, but simple, IT security measures.

This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet. Like us on Facebook. Follow us on Twitter.

IBM Solution Security & Resiliency

IBM IT security expertise can help medium-sized businesses develop, implement and maintain comprehensive strategies to combat ever-evolving security threats without increasing complexity, cost, or resources required for administration.

Learn More »

More on This Topic

Three Security Concerns for 2016

By Allan Pratt on Dec 4, 2015
As we near the end of 2015, what will 2016 look like in the information security sector? Undoubtedly there be an increase in data breaches across all industries, but will businesses take the high road and inform their customers and ...