Organizations are increasingly effective at applying the “just enough” access piece using privileged access management (PAM) solutions, but they have largely neglected the time-limited part and persistent risk portion of the equation for privileged user accounts.
IT departments are under incredible pressure to maintain the business productivity for an expanded remote workforce that may already be exponentially larger than it was just a few weeks ago. As many IT teams work overtime to enable remote workers, the risks of not maintaining security practices are also top of mind, with the acute awareness that threat actors are actively seeking opportunities to benefit from current circumstances.