BylinesGovernance & ComplianceIdentity & AccessThreat Detection & Defense

Data Privacy Week 2025: Protecting Privileged Accounts in the Modern Digital Era

By Darren Guccione, CEO and Co-Founder, Keeper Security 

As Data Privacy Week approaches from 27 to 31 January, the topic of data privacy continues to dominate cybersecurity discussions, especially in the wake of Singapore’s Accounting and Corporate Regulatory Authority (ACRA) incident. This episode allowed for the accidental disclosure of full national identification numbers through a search function on its new business portal. With a full review set for completion in February, this incident serves as a reminder for businesses to reassess their data protection measures – especially when it comes to privileged accounts, which are often the most valuable targets for cybercriminals.

In an era when digital transformation drives business strategies, ensuring robust data privacy practices is more critical than ever. ACRA’s lapse underscores the need for businesses to reassess their data protection measures – particularly when it comes to protecting privileged accounts, which are often the most valuable targets for cybercriminals.

Rising Threats and the Importance of Privileged Access Management 

Cybercriminals are increasingly sophisticated, leveraging advanced tactics to exploit weaknesses within organisations. According to recent studies, 41% of businesses in the APAC region experienced a data breach in the past year, with nearly half reporting more than 10 incidents. This growing threat is exacerbated by poorly secured privileged accounts, which, if compromised, can provide attackers with full access to critical systems, exfiltrate sensitive data and wreak havoc on business operations.

For example, a former employee at Cash App exploited privileged access to steal sensitive user data, affecting over 8 million customers. The company’s delayed response and subsequent class-action lawsuit highlight just how costly and damaging the compromise of privileged accounts can be. As cyber attacks evolve, the need for a comprehensive security strategy that prioritises these accounts becomes undeniable.

The Challenges of Securing Privileged Accounts 

Protecting privileged accounts is becoming increasingly difficult due to the expanded attack surface created by cloud adoption, remote work and hybrid environments. As businesses embrace digital transformation, new vulnerabilities arise – particularly concerning privileged accounts. Employees accessing systems from multiple devices and locations make consistent security measures harder to maintain.

Human error also remains a major contributor to breaches, with 74% involving the human element, including stolen or weak passwords, credentials and secrets. It’s essential for organisations to invest in employee training on strong password practices and the risks associated with privileged accounts. Insider threats – whether accidental or malicious – also complicate matters, as privileged access can be exploited by trusted individuals.

The growing sophistication of cyber threats further underscores the need for vigilance. Cybercriminals are employing advanced tactics in social engineering and phishing attacks to target privileged accounts, which are often the most valuable to attackers.

Why Privileged Access Management (PAM) is Essential 

Privileged Access Management (PAM) refers to the strategies and tools that help organisations control and monitor accounts with access to privileged information, including sensitive systems and data.. Implementing PAM provides greater visibility into IT infrastructure, enabling organisations to manage third-party access, monitor user activity, ensure compliance and mitigate the risk of cyber attacks.

By reducing the number of users with elevated privileges, PAM minimises the attack surface, making it harder for cybercriminals to exploit vulnerabilities. It also helps prevent insider threats by controlling who has access to sensitive systems, offering strict access controls and real-time activity monitoring. This proactive approach helps organisations identify and stop malicious behaviour before a breach occurs.

Many regulatory frameworks require organisations to implement access controls and auditing for privileged accounts. PAM solutions support compliance by providing the necessary reporting and oversight to meet these standards.

Conclusion

As the digital landscape continues to evolve, protecting privileged accounts is essential to maintaining data privacy and security. Implementing a PAM solution helps organisations minimise vulnerabilities by controlling access, monitoring activity and ensuring compliance. With cyber threats becoming more sophisticated, organisations must prioritise PAM as a core part of their cybersecurity strategy to mitigate risks and protect sensitive information. Data Privacy Week serves as a timely reminder for businesses to strengthen their defences, and protect the data and trust their customers rely on.

Darren Guccione

CEO and Co-Founder, Keeper Security

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *