You may want to review our corporate mergers and acquisitions security learning guide or other tips on information...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
security merger management.
Depending on the level of publicity around the merger, external threats of attack may increase. Criminals could assume -- perhaps rightly -- that you are distracted by the merger or too busy investigating the other company to monitor your systems for attacks. To mitigate merger threats, monitor for unexpected connections from the other company, and pay close attention to your systems and logs throughout the M&A process. When analyzing the logs, one possible indicator of malicious activity could be logins by accounts with high levels of access from more than one location in a short period of time.
Internal threats could arise from the other organization connecting to your internal network. Such connections might connect on the inside of your firewall and bypass all of the network protections you have in place. During a merger, the internal threat could come from users who are transferring roles or gaining additional access to systems, users who might then be able to manipulate their roles for malicious purposes. To prevent this, enable additional logging and analysis during this time to identify potential issues, and make sure the integration and provisioning of user roles are carefully monitored.
Dig Deeper on Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions
Related Q&A from Nick Lewis
Vonteera adware has the ability to disable antimalware software on endpoint devices. Expert Nick Lewis explains how enterprises can prevent this ...continue reading
ModPOS, a new POS malware, compromised millions of credit card accounts in 2015. Expert Nick Lewis explains how cybercriminals use this malware and ...continue reading
Amex cards have been discovered to be vulnerable to credit card hacking. Expert Nick Lewis explains how this happens, and what can be done about Chip...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.