Join other Information Security Professionals and Subscribe

to receive monthly insights on securely enabling business transformation

Bridgeway Insights

The Threat of Inactive Users

The Threat of Inactive Users

Posted by Louisa Mackintosh 22 August 2018

The risks posed by inactive (dormant) users present on an organisation's servers are a potential goldmine for malicious attackers but also serve to highlight poor user management processes. Indeed, both the ISO 27001 control framework and the PCI DSS information security standard require organisations to monitor, act, and also report on these inactive users.

The users on your MobileIron servers are no different, but are often overlooked.

IronWorks Inactive Users

Identifying users who are still present on your server, but do not have associated devices attached to them, is not trivial. However IronWorks can help in this regard as well: not only identifying them, but also allowing you to report on these over time. 

IronWorks brochure mobility project

Tags
IronWorks