BeyondTrust published the Privileged Access Threat Report 2019, a global survey that explores cyber risks and strategies related to external/insider threats, vendor access, IoT, and more across the U.S., EMEA, and APAC.

While organizations rely on IT privileges to enable essential operations and functionality, the potential for misuse or abuse of privilege by insiders, malware, and external threat actors continues to expand in scope. Today, privileges proliferate across on-premise and cloud environments. They’re built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, and more. IoT devices are notorious for hardcoding credentials that provide privileged access—but the practice of embedding credentials persists in many other parts of the IT ecosystem as well.

Gartner recognized privileged account management as the #1 IT security project for 2018, and in Feb. 2019 report, again acknowledged PAM as a top-10 IT security project while ranking it second in the information security space for spending growth. BeyondTrust published research — the Privileged Access Threat Report 2019 — that also indicates that PAM is getting more scrutiny, with roughly 93% of organizations using some PAM tools. However, there is clearly much work for organizations to do in maturing their privileged access security controls. As this new BeyondTrust research reveals, privilege blind spots, backdoors, and careless practices abound.

Link to the site with the Privileged Access Threat Report 2019: