• Daily News
  • Features
  • Events
    • DBusiness Events
    • D500 Soirée
    • Party Pictures
    • Partner Events
    • Photography Request Form
  • Resources
    • 30 in Their Thirties
    • Company Milestone Profiles
    • Detroit 500
    • Commercial Real Estate Awards
    • Top Corporate Culture Awards
    • Powered by Women
    • Faces of DBusiness Law
    • Faces of Detroit
    • Top Corporate Council Awards – Logo
    • From The Top Lists
    • Michigan Makers
    • Northern Michigan Restaurant Guide
    • Financial Professionals
    • Business Professionals
    • Lawyers
    • Other Professionals
    • Restaurants
    • Shopping
    • Videos
  • Magazine
    • Archive
    • Careers
    • Digital Edition
    • Subscribe
    • Purchase Single Issues
    • Editorial Calendar
    • Newsletters
    • Where to Find
    • Contact
    • Advertise
      • Digital Studio
  • Hustle and Muscle
    • Hustle and Muscle Features
    • Startup Submissions
    • The Hustle
    • The Muscle
Sign in
Welcome!Log into your account
Forgot your password?
Create an account
Privacy & Cookies Policy
Sign up
Welcome!Register for an account
A password will be e-mailed to you.
Privacy & Cookies Policy
Password recovery
Recover your password
Search
  • Subscribe
  • Contact
  • Archive
  • Advertise
  • Business Professionals
  • Financial Professionals
  • Lawyers
  • Other Professionals
  • Restaurants
  • Shopping
Sign in
Welcome! Log into your account
Forgot your password? Get help
Create an account
Privacy & Cookies Policy
Create an account
Welcome! Register for an account
A password will be e-mailed to you.
Privacy & Cookies Policy
Password recovery
Recover your password
A password will be e-mailed to you.
DBusiness Magazine DBusiness Magazine
DBusiness Magazine DBusiness Magazine
  • Daily News
  • Features
  • Events
    • DBusiness Events
    • D500 Soirée
    • Party Pictures
    • Partner Events
    • Photography Request Form
  • Resources
    • 30 in Their Thirties
    • Company Milestone Profiles
    • Detroit 500
    • Commercial Real Estate Awards
    • Top Corporate Culture Awards
    • Powered by Women
    • Faces of DBusiness Law
    • Faces of Detroit
    • Top Corporate Council Awards – Logo
    • From The Top Lists
    • Michigan Makers
    • Northern Michigan Restaurant Guide
    • Financial Professionals
    • Business Professionals
    • Lawyers
    • Other Professionals
    • Restaurants
    • Shopping
    • Videos
  • Magazine
    • Archive
    • Careers
    • Digital Edition
    • Subscribe
    • Purchase Single Issues
    • Editorial Calendar
    • Newsletters
    • Where to Find
    • Contact
    • Advertise
      • Digital Studio
  • Hustle and Muscle
    • Hustle and Muscle Features
    • Startup Submissions
    • The Hustle
    • The Muscle
Home Sponsor Content KeyBank
  • Sponsor Content
Sponsored

KeyBank

Are there extra steps I can take to protect my company’s data?
By
KeyBank
-
November 7, 2022
1173
Facebook
Twitter
Pinterest
WhatsApp

    Q: Are there extra steps I can take to protect my company’s data?

    A: Given the growing number of cyberattacks companies need to be more vigilant — especially when a breach has the potential to significantly disrupt business. The term “privileged access” refers to special network access or IT capabilities above and beyond those that apply to standard users. A human user, such as an IT administrator, can have privileged access. It can also be granted to a non-human user, like an application.

    Here are some privileged access management best practices that can help companies educate privileged access users and protect their data:

    •  Educate privileged access users on current cyber threats and best practices, including using unique pass-phrases for their accounts.
    •  Require multi-factor authentication for privileged access accounts, including SaaS, admins and privileged business users.
    •  Maintain a centrally managed, digital vault to hold well-known infrastructure accounts;  automatically rotate passwords after each use.
    •  Vault any privileged accounts used by third-party applications.
    •  Conduct “red team/blue team” simulations, where members of your IT department role-play as attackers and attempt to exploit security weaknesses in your systems. This way, you can identify the weaknesses and address them.

    For more information on protecting your company’s private data, visit key.com/payments.

    This material is presented for informational purposes and shouldn’t be construed as individual financial advice. KeyBank doesn’t provide legal advice. Member FDIC. CFMA #220909-171494.

    KeyBank
    David Mannarino
    President & Commercial Sales Leader
    KeyBank Michigan Market
    248-204-6550
    David_Mannarino@keybank.com






    Facebook
    Twitter
    Pinterest
    WhatsApp
      Previous articleCreating Opportunities To Succeed: Breaking the cycle of poverty for the next generation and beyond.
      Next articleUniversity of Michigan to Ramp Up AI Research Over Next 6 Years
      Marissa Jacklyn

      RELATED ARTICLESMORE FROM AUTHOR

      Sponsored

      The Connection Architects: How WZC Networking Powers Michigan’s Digital Infrastructure

      Anna's House
      Sponsored

      Anna’s House Expands East: Michigan Breakfast Brand Continues Rapid Growth with Grand Ledge Opening

      Sponsored

      The H-1B Lottery is Not Dead (Yet)

       

      NEWSLETTERS

      DIGITAL SPONSORS

      Detroit 500
      Venture Capital
      Commercial Real Estate
      Powered by Women Sidebar
      30 in their Thirties
      Top Corporate Counsel Sidebar
      Top Lawyers
      Compendium News Links

      FOLLOW US

      4,462FansLike
      1,305FollowersFollow
      19,399FollowersFollow

      FROM OUR PARTNERS

      Sponsored

      The Connection Architects: How WZC Networking Powers Michigan’s Digital Infrastructure

      November 3, 2025
      Anna's House
      Sponsored

      Anna’s House Expands East: Michigan Breakfast Brand Continues Rapid Growth with...

      November 3, 2025
      Sponsored

      The H-1B Lottery is Not Dead (Yet)

      November 2, 2025
      Sponsored

      Your Brand and the AI Visibility Gap: What Modern CMOs and...

      October 23, 2025
      Sponsored

      Michigan’s #1 Cannabis Industry Conference to Connect Professionals Through Knowledge Sharing...

      October 13, 2025
      DBusiness Magazine
      ABOUT US
      DBusiness Magazine – Detroit’s Premier Business Journal
      FOLLOW US
      • Archive
      • Subscribe
      • Careers
      • Contact
      • Advertise
      • Terms of Use
      • Privacy & Cookies Policy
      © 2025 - DBusiness Magazine
      Near me
      40 miles