The trouble with contractors: how granting full system access is a security weakness

25 Sep 2017 02:26 PM

Blog posted by: Undisclosed CSO, 25 September 2017.

The trouble with contractors: how granting full system access is a security weakness

AXELOS' "Cyber Stories from the Frontline" brings to life the reality of cybercrime for organizations today and from the perspective of those who have first-hand experience

How often do we hear stories of how multi-national corporations have been hacked via third-party software that runs their air conditioning or a contractor that supplies their catering?

This is exactly what happened to one CSO in our real-life 'Cyber Stories from the Frontline' series of cyber security stories.

How can the account act as both a warning and a guide for other organizations as they look to keep control of cyber security while using third-party contractors?

In the third of our series, The Trouble with Contractors, we explore:

To find out what you can learn from this Cyber Story from the Frontline, download the full story, The trouble with contractors.

Read more Cyber Stories from the Frontline

What happens when your cyber-attack hits the headlines?

Hacked into a parallel universe