Boatner Blankenstein, senior director of solutions engineering at Bomgar, a company that provides tools for securing remote access, said the Target breach shows why companies need to implement measures for controlling what third-parties can do on their networks.
Large enterprises often grant remote access rights to software, hardware, and numerous other vendors and external third parties. But few have measures in place for ensuring that the access is properly authenticated and secured.
While many companies might routinely log remote access sessions, few have capabilities to audit the access from a security standpoint, he said.
Sign up for CIO Asia eNewsletters.