While most attention today is placed on containing complex malware and outside hacking threats, enterprises could significantly improve their risk posture by taking a look at how well they manage the access they give privileged insiders, such as network and database administrators and other IT professionals. What most organizations find is that they don't have a firm enough grip on the access these users have.

To keep sensitive information safe and to maintain regulatory compliance, it's crucial that privileged insider access be properly managed.

The link for this article located at CSO Online is no longer available.