
Sign up to save your podcasts
Or


If the Ponemon study were a horror flick, it'd be titled "The Login Came from Inside the System." This week's episode dives into the alarming trend of organizations handing out privileged access like Halloween candy — only to forget who's still got it long after the party's over. With 59% of breaches linked to insiders or third parties, and executives confidently sailing past the iceberg of reality, we explore what happens when no one's really sure who can still get into the network. Spoiler alert: it's not good. So grab your flashlight and audit logs — we're heading into the haunted house of unrevoked access.
More info at HelpMeWithHIPAA.com/507
By Donna Grindle and David Sims4.9
6161 ratings
If the Ponemon study were a horror flick, it'd be titled "The Login Came from Inside the System." This week's episode dives into the alarming trend of organizations handing out privileged access like Halloween candy — only to forget who's still got it long after the party's over. With 59% of breaches linked to insiders or third parties, and executives confidently sailing past the iceberg of reality, we explore what happens when no one's really sure who can still get into the network. Spoiler alert: it's not good. So grab your flashlight and audit logs — we're heading into the haunted house of unrevoked access.
More info at HelpMeWithHIPAA.com/507

228,771 Listeners

153,513 Listeners

32,755 Listeners

3,948 Listeners

1,024 Listeners

28,498 Listeners

87,279 Listeners

112,238 Listeners

8,046 Listeners

16,914 Listeners

74 Listeners

9,927 Listeners

50,244 Listeners

57,851 Listeners

16,848 Listeners