Learn About Cybersecurity from OneLogin’s Perspective

Ice and Firewalls Song

As the Game of Thrones season seven wraps up, the showdown between the dead and the living is drawing ever closer. Watching Jon Snow plus his allies preparing their forces for the coming war, you cannot help to see comparisons between the Night’s Watch defenses and those of cybersecurity team in real life.

The Night’s Watch is known as unsung heroes sworn brotherhood vowed to make sure that the Seven Kingdoms is safe from Westeros’ northern border unknowns. More specifically, it is their duty to protect The Wall from attacking forces of White Walkers, wildlings, and wights from beyond. That’s similar to today’s cybersecurity teams’ responsibilities of keeping the corporate data secure from malicious cyber attackers. We could learn about cybersecurity from the Night’s Watch.

Be Cautious of Zombie Accounts

In the first season, two missing Night’s Watchmen bodies are recovered from the forest that’s haunted behind The Wall, and they are returned to Castle Black. When night falls, one of dead Night’s watchmen revives as a wight and then attacks Jon. It isn’t until Jon burns the wight that it was ultimately put to rest permanently.

The lesson in this episode is that simply because an employee left your employ, does not mean their digital account is not a threat to security. A Study found that more than half of ex-employees are still having zombie accounts that could be used in accessing corporate data and apps. So, cybersecurity teams need to burn the former employee accounts’ bodies metaphorically, to lessen that risk.

One easy way to achieve that is through IDaaS (identity as a Service) solution, in which your security team could efficiently de-provision employees completely through manual and automated processes.

Launched in the year 2009 by the Pedersens brothers, OneLogin simplifies IAM (identity and access management) for a more effective, secure business, delivering an identity and access management platform in the cloud that is trusted by tens of thousands of customers. Their enterprise identity management (ID) software streamlines the IAM with a provisioning that is automated and secures access via SSO (single sign-on) through all device types on-premises applications and to the cloud.