{"id":10156,"date":"2023-03-23T10:54:46","date_gmt":"2023-03-23T08:54:46","guid":{"rendered":"https:\/\/www.kappadata.nl\/?p=10156"},"modified":"2023-03-23T10:55:52","modified_gmt":"2023-03-23T08:55:52","slug":"how-to-stop-cybercriminals-misusing-privileged-credentials","status":"publish","type":"post","link":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/","title":{"rendered":"How to stop cybercriminals misusing privileged credentials"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><em>Market analysts rank securing privileged access as the no. 1 priority for CISOs due to high-profile breaches focused on privileged accounts. Major cyber-attacks in recent years have all had one thing in common: the breach was the result of the misuse or abuse of privileged accounts.<\/em><\/p>\n<p>[\/vc_column_text][vc_column_text]You need a trusted Privileged Access Management* (PAM) solution to keep potential data breaches at bay (and reduce the headache of managing accounts yourself). More than 85% of organisations say their employees have more privileges than they need. This is a huge security risk for most organisations, including yours.<\/p>\n<p>*<em>Privileged Access Management (PAM), sometimes referred to as &#8216;privileged account management&#8217;<\/em>[\/vc_column_text][vc_empty_space][vc_column_text]<\/p>\n<h4><strong>What is a privileged account?<\/strong><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;16px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text]Privileged accounts are a subset of accounts that provide elevated access and permissions across applications, devices and systems within an IT environment.[\/vc_column_text][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_single_image image=&#8221;10158&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; qode_css_animation=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_column_text]Examples of common privileged accounts include the UNIX root account, the Active Directory administrator account, a DBA account, or the superuser accounts built into every application and system.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space][vc_column_text]<\/p>\n<h4><strong>What is Privileged Access Management (PAM)?<\/strong><\/h4>\n<p>Privileged Access Management (PAM) is the set of cybersecurity strategies and technologies used to control the elevated (&#8216;privileged&#8217;) access and permissions for users, accounts, processes and systems in an IT environment.[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_column_text]<\/p>\n<h4><strong>Why is Privileged Access Management (PAM) important?<\/strong><\/h4>\n<p>Hackers are targeting your privileged accounts, which provide unrestricted access to your systems and data. In almost every recent high-profile breach, lapses in security and user practices were exploited by hackers to gain privileged account credentials. By implementing the right level of privileged access controls, PAM can help organisations condense their attack surface and prevent or at least mitigate the damage from both external attacks and insider misuse or negligence.[\/vc_column_text][vc_empty_space height=&#8221;16px&#8221;][vc_single_image image=&#8221;10164&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; qode_css_animation=&#8221;&#8221;][vc_empty_space height=&#8221;64px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1679499939552{border-radius: 4px !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><em><strong>But you can limit your vulnerability with an on-demand solution that provides a secure, efficient and compliant way to manage privileged accounts:<\/strong><\/em><\/h5>\n<p style=\"text-align: center;\"><strong>One Identity Safeguard On Demand<\/strong> automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;48px&#8221;][vc_column_text]<\/p>\n<h4><strong>Why consider our on-demand (SaaS) solution?<\/strong><\/h4>\n<ul>\n<li><strong>Accessible<\/strong>: Runs in an internet browser from any device<\/li>\n<li><strong>Cost-effective<\/strong>: No upfront hardware costs and flexible payment options such as pay-as-you-go models<\/li>\n<li><strong>Easy to manage<\/strong>: No installation, device updates or traditional license management<\/li>\n<li><strong>Easy to use<\/strong>: Requires no changes to user workflows (works in transparent mode)<\/li>\n<li><strong>Accreditation<\/strong>: One Identity SaaS solutions are developed, operated and supported within the One Identity Information Security Management Platform, which is ISO\/IEC 27001:2013 certified.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;24px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][qode_elements_holder background_color=&#8221;#f6f6f6&#8243; number_of_columns=&#8221;one_column&#8221; custom_class=&#8221;card&#8221;][qode_elements_holder_item vertical_alignment=&#8221;middle&#8221; horizontal_alignment=&#8221;center&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h4><strong>Try One Identity Safeguard virtually for free!<\/strong><\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;16px&#8221;][vc_column_text]Start your trial to see how Safeguard can help you. Prevent and limit the damage from a breach with this SaaS-based PAM solution that provides a secure, efficient and compliant way to manage privileged accounts. <strong>Safeguard On Demand<\/strong> combines a secure password safe, session management and a monitoring solution delivered from the cloud.[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li>Mitigate the potential damage of security breaches<\/li>\n<li>Meet compliance requirements<\/li>\n<li>Realise rapid ROI with simplified deployment and management<\/li>\n<li>Deploy in transparent mode with no changes to user tools or workflows<\/li>\n<li>Automate time-consuming privileged account processes<\/li>\n<li>Approve password requests from anywhere<\/li>\n<li>Monitor, record and audit sessions with real-time alerting and blocking<\/li>\n<li>Use pattern-free analysis to identify poor user behavior<\/li>\n<li>Reduce alert noise by categorising alerts by risk and deviation level<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space]<a  itemprop=\"url\" href=\"https:\/\/www.oneidentity.com\/products\/safeguard-on-demand\/\" target=\"_blank\"  class=\"qbutton  default\" style=\"\">Start your trial here!<\/a>[\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don&#8217;t have a Privileged Access Management (PAM) solution in place, you&#8217;re leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.<\/p>\n","protected":false},"author":1,"featured_media":10181,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[75,71],"tags":[],"class_list":["post-10156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-publications"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to stop cybercriminals misusing privileged credentials<\/title>\n<meta name=\"description\" content=\"Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don&#039;t have a Privileged Access Management (PAM) solution in place, you&#039;re leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to stop cybercriminals misusing privileged credentials\" \/>\n<meta property=\"og:description\" content=\"Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don&#039;t have a Privileged Access Management (PAM) solution in place, you&#039;re leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/\" \/>\n<meta property=\"og:site_name\" content=\"Kappa Data\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/kappadata\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-23T08:54:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T08:55:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Visual-PAM-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1187\" \/>\n\t<meta property=\"og:image:height\" content=\"791\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/person\\\/9035e3df9443e108d4369503f70958e6\"},\"headline\":\"How to stop cybercriminals misusing privileged credentials\",\"datePublished\":\"2023-03-23T08:54:46+00:00\",\"dateModified\":\"2023-03-23T08:55:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/\"},\"wordCount\":1016,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Visual-PAM-01.png\",\"articleSection\":[\"News\",\"publications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/\",\"name\":\"How to stop cybercriminals misusing privileged credentials\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Visual-PAM-01.png\",\"datePublished\":\"2023-03-23T08:54:46+00:00\",\"dateModified\":\"2023-03-23T08:55:52+00:00\",\"description\":\"Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don't have a Privileged Access Management (PAM) solution in place, you're leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Visual-PAM-01.png\",\"contentUrl\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Visual-PAM-01.png\",\"width\":1187,\"height\":791},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/how-to-stop-cybercriminals-misusing-privileged-credentials\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to stop cybercriminals misusing privileged credentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\",\"name\":\"Kappa Data\",\"description\":\"The Art of IT-infrastucture, security and IoT distribution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\",\"name\":\"Kappa Data\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Kappa-Data-600x120-Horizontaal-No-Base.png\",\"contentUrl\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Kappa-Data-600x120-Horizontaal-No-Base.png\",\"width\":600,\"height\":120,\"caption\":\"Kappa Data\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/kappadata\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/kappa-data-nederland\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/person\\\/9035e3df9443e108d4369503f70958e6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c68117f0a9d9dbc77c582cb698d02363e2ffb73c9c63e25816b9e538db8232c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c68117f0a9d9dbc77c582cb698d02363e2ffb73c9c63e25816b9e538db8232c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c68117f0a9d9dbc77c582cb698d02363e2ffb73c9c63e25816b9e538db8232c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/kappadata.nl\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to stop cybercriminals misusing privileged credentials","description":"Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don't have a Privileged Access Management (PAM) solution in place, you're leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/","og_locale":"en_US","og_type":"article","og_title":"How to stop cybercriminals misusing privileged credentials","og_description":"Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don't have a Privileged Access Management (PAM) solution in place, you're leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.","og_url":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/","og_site_name":"Kappa Data","article_publisher":"https:\/\/facebook.com\/kappadata","article_published_time":"2023-03-23T08:54:46+00:00","article_modified_time":"2023-03-23T08:55:52+00:00","og_image":[{"width":1187,"height":791,"url":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Visual-PAM-01.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#article","isPartOf":{"@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/"},"author":{"name":"admin","@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/person\/9035e3df9443e108d4369503f70958e6"},"headline":"How to stop cybercriminals misusing privileged credentials","datePublished":"2023-03-23T08:54:46+00:00","dateModified":"2023-03-23T08:55:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/"},"wordCount":1016,"commentCount":0,"publisher":{"@id":"https:\/\/www.kappadata.nl\/en\/#organization"},"image":{"@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Visual-PAM-01.png","articleSection":["News","publications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/","url":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/","name":"How to stop cybercriminals misusing privileged credentials","isPartOf":{"@id":"https:\/\/www.kappadata.nl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#primaryimage"},"image":{"@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Visual-PAM-01.png","datePublished":"2023-03-23T08:54:46+00:00","dateModified":"2023-03-23T08:55:52+00:00","description":"Cyber-attacks and data breaches are in the news all the time, and 80% of them involve privileged credentials! If you don't have a Privileged Access Management (PAM) solution in place, you're leaving the door open to hackers. One Identity Safeguard On Demand automates, controls and secures the provision of privileged credentials with role-based access management and automated workflows.","breadcrumb":{"@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#primaryimage","url":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Visual-PAM-01.png","contentUrl":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Visual-PAM-01.png","width":1187,"height":791},{"@type":"BreadcrumbList","@id":"https:\/\/www.kappadata.nl\/en\/how-to-stop-cybercriminals-misusing-privileged-credentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kappadata.nl\/en\/"},{"@type":"ListItem","position":2,"name":"How to stop cybercriminals misusing privileged credentials"}]},{"@type":"WebSite","@id":"https:\/\/www.kappadata.nl\/en\/#website","url":"https:\/\/www.kappadata.nl\/en\/","name":"Kappa Data","description":"The Art of IT-infrastucture, security and IoT distribution","publisher":{"@id":"https:\/\/www.kappadata.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kappadata.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kappadata.nl\/en\/#organization","name":"Kappa Data","url":"https:\/\/www.kappadata.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Kappa-Data-600x120-Horizontaal-No-Base.png","contentUrl":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Kappa-Data-600x120-Horizontaal-No-Base.png","width":600,"height":120,"caption":"Kappa Data"},"image":{"@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/kappadata","https:\/\/www.linkedin.com\/company\/kappa-data-nederland\/"]},{"@type":"Person","@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/person\/9035e3df9443e108d4369503f70958e6","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c68117f0a9d9dbc77c582cb698d02363e2ffb73c9c63e25816b9e538db8232c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c68117f0a9d9dbc77c582cb698d02363e2ffb73c9c63e25816b9e538db8232c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c68117f0a9d9dbc77c582cb698d02363e2ffb73c9c63e25816b9e538db8232c?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/kappadata.nl"]}]}},"_links":{"self":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/posts\/10156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/comments?post=10156"}],"version-history":[{"count":3,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/posts\/10156\/revisions"}],"predecessor-version":[{"id":10188,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/posts\/10156\/revisions\/10188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/media\/10181"}],"wp:attachment":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/media?parent=10156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/categories?post=10156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/tags?post=10156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}