Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Research: Half of Enterprises Suffered Insider Attacks in Last 12 Months

    Written by

    Chris Preimesberger
    Published November 20, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      People are often surprised to find out that most damaging security threats do not originate from malicious outsiders or malware, but from trusted employees inside a company or value chain. Sometimes the person you think most trustworthy inside a company turns out to be the mole. 

      It’s all about human nature. None of us can ever read people’s minds and know the true and/or secret motivations that cause a trusted employee to go south. Not even the best security scheme can stop a malminded insider from doing damage.

      The 2018 Threat Report, released Nov. 20 and conducted by Crowd Research Partners, clearly indicates that the vast majority of companies and government agencies believe that they’re vulnerable to insider threats.

      The survey is based on a comprehensive online survey of 472 cybersecurity professionals, which provides deep insight into current security trends.

      “About half of the report’s respondents said they experienced an insider attack during the last 12 months,” said Holger Schulze, founder of Crowd Research Partners. “This report reveals the latest trends and provides actionable guidance on addressing threats as well as showcases how organizations are working to protect their critical data to prevent and mitigate inside threats.”

      Here are some highlights from the report:

      • Ninety percent of organizations believe they are vulnerable to insider attacks. The main enabling risk factors include too many users with excessive access privileges (37 percent), an increasing number of devices with access to sensitive data (36 percent) and the increasing complexity of information technology (35 percent).
      • Fifty-two percent confirmed that they suffered insider attacks against their organization in the previous 12 months (typically less than five attacks). Twenty-seven percent of organizations say insider attacks have become more frequent.
      • Organizations are shifting their focus to detection of insider threats (64 percent), followed by deterrence methods (58 percent) and analysis/post breach forensics (49 percent).
      • User behavior monitoring is accelerating. Eighty-eight percent of organizations deploy some method of monitoring users and 93 percent monitor access to sensitive data. The number of organizations monitoring their user behavior has increased significantly compared to last year (94 percent this year compared to 42 percent last year).
      • Identification of high-risk insiders is a key part of a threat prevention strategy. One way to identify these individuals is to profile their behavior and work patterns. Organizations surveyed strongly believe it is necessary to identify high-risk insiders based on their behaviors (88 percent).
      • Companies are equally worried about accidental/unintentional data breaches (51 percent) through user carelessness, negligence or compromised credentials as they are from deliberate malicious insiders (47 percent).
      • The most popular technologies to deter insider threats are data loss prevention (DLP), encryption, and identity and access management solutions. To better detect active insider threats, companies deploy intrusion detection and prevention (IDS), log management and SIEM platforms.
      • More than three-fourths (78 percent) of respondents inventory and monitor all or the majority of their key assets. An overwhelming majority (93 percent) of organizations monitor access to sensitive data. The level of monitoring varies; 47 percent continuously monitor data access and movement to proactively identify threats.
      • Eighty-six percent of organizations already have or are building an insider threat program. Some 36 percent have a formal program in place to respond to insider attacks, while 50 percent are focused on developing their program.
      • Organizations are shifting their focus on detection of internal threats. In this year’s survey, detection (64 percent) surpassed deterrence methods (58 percent) to take the top spot, followed by analysis and post breach forensics (49 percent).
      • For the third year in a row, lack of training and expertise (52 percent) remain the biggest barrier to better insider threat management. Other barriers include the lack of suitable technology (43 percent); tied for third place in this year’s survey are both lack of collaboration between departments (34 percent) and lack of budget (34 percent). Notably, lack of budget fell from second place last year to third this year.

      You can download the complete report here.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×