How Fake ‘Insiders’ Can Hijack an Organization

By Karen A. Frenkel  |  Posted 10-20-2015 Email

Privileged accounts are at the epicenter of most cyber-attacks, but many organizations still struggle to identify and locate such accounts, according to a new study. Yet access to these accounts can lead to a "complete hostile takeover" of network infrastructure and stolen data, the report by security firm CyberArk revealed. The study, "Global Advanced Threat Landscape Survey 2015," results from interviews with 673 IT security and C-level executives in North America, Europe and Asia-Pacific. It provides statistics and debunks some respondents' beliefs and assumptions that although the majority of respondents express confidence in their organization's cyber-strategy, CyberArk said this is contradicted by how today's attacks are conducted and the security approaches deployed. Furthermore, the report states that C-level executives and boards can no longer blame sophisticated attacks or employees for security lapses. "This needs to be accounted for in a holistic security strategy that assumes motivated attackers will always find a way to breach a network," CyberArk warned.

Karen A. Frenkel writes about technology and innovation and lives in New York City.


Submit a Comment

Loading Comments...