
Sign up to save your podcasts
Or


If the Ponemon study were a horror flick, it'd be titled "The Login Came from Inside the System." This week's episode dives into the alarming trend of organizations handing out privileged access like Halloween candy — only to forget who's still got it long after the party's over. With 59% of breaches linked to insiders or third parties, and executives confidently sailing past the iceberg of reality, we explore what happens when no one's really sure who can still get into the network. Spoiler alert: it's not good. So grab your flashlight and audit logs — we're heading into the haunted house of unrevoked access.
More info at HelpMeWithHIPAA.com/507
By Donna Grindle and David Sims4.9
6161 ratings
If the Ponemon study were a horror flick, it'd be titled "The Login Came from Inside the System." This week's episode dives into the alarming trend of organizations handing out privileged access like Halloween candy — only to forget who's still got it long after the party's over. With 59% of breaches linked to insiders or third parties, and executives confidently sailing past the iceberg of reality, we explore what happens when no one's really sure who can still get into the network. Spoiler alert: it's not good. So grab your flashlight and audit logs — we're heading into the haunted house of unrevoked access.
More info at HelpMeWithHIPAA.com/507

228,126 Listeners

154,054 Listeners

32,724 Listeners

3,942 Listeners

1,019 Listeners

28,049 Listeners

87,153 Listeners

112,327 Listeners

8,013 Listeners

16,888 Listeners

73 Listeners

9,844 Listeners

48,572 Listeners

58,231 Listeners

17,025 Listeners