You are here

Employee Impersonation - Usurping Trusted Relationships

Employee Impersonation - Usurping Trusted Relationships

Created: Tuesday, June 26, 2018 - 11:50
Categories:
Cybersecurity

Employees and contractors can become mere victims of a cyber attack. Often their actions are unintentional, but damaging nonetheless, when credentials are shared with others or stolen and used by attackers to illegally authenticate to valuable systems. Knowing how employees and contractors access your systems and the devices they use will help detect anomalous behavior attempting to impersonate these trusted relationships. ThreatMetrix, a Lexis Nexis Risk Solutions Company, suggests the key is to deploy solutions that give you the ability to instantly recognize trusted users to speed up authentication while denying logins from known sources of fraud. ThreatMetrix.