SHARE
Facebook X Pinterest WhatsApp

When Security Breaches Come From Within

Feb 4, 2015

When Security Breaches Come From Within

Insider Threats RuleInsider Threats Rule

93% of U.S. respondents say they feel vulnerable to insider attacks. Only 7% feel safe. 59% believe privileged users pose the most threats to their organizations.

Security PrioritiesSecurity Priorities

Preventing a data breach is the highest or second-highest priority for IT security spending, according to 54% of respondents.

Cloud and Databases Most At-RiskCloud and Databases Most At-Risk

46% of American respondents believe the cloud environment is the greatest risk for loss of sensitive data in their organization, yet 47% said databases have the greatest amount of sensitive data at risk.

Playing Catch-UpPlaying Catch-Up

44% of American respondents said their organization experienced a data breach or failed a compliance audit last year. 34% said their organizations are protecting sensitive data because of a breach at a partner or competitor.

Worldwide Perception of Insider ThreatsWorldwide Perception of Insider Threats

55% of global respondents believe privileged users are the greatest threat. Contractors and service providers followed at 46%, business partners at 43%.

Top Three Locations for Most At-Risk DataTop Three Locations for Most At-Risk Data

The top three places by volume where data is at risk: Databases (47%), File Servers (39%), Cloud (37%)

Disagreement Over Where Most At-Risk Data ResidesDisagreement Over Where Most At-Risk Data Resides

“Corporate servers and databases pose the highest risk, yet spending remains stubbornly focused on endpoint and mobile,” according to the report. “Only 20% of sensitive company data is held on mobile devices.”

Positions of Insiders Posing Largest ThreatPositions of Insiders Posing Largest Threat

In the wake of the Snowden case, respondents named insider positions posing the greatest threat: Privileged Users: 55%, Contractors and Service Providers: 46%, Business Partners: 43%, Ordinary Employees: 35%, Executive Management: 28%, Other IT Staff: 25%

Confusion Over What to ProtectConfusion Over What to Protect

Although security spending increased 10% in 2014 and double-digit growth is expected this year, the report said spending is unfocused.

Dangerous Insiders Have Privileged AccessDangerous Insiders Have Privileged Access

Only one-half of all businesses have deployed privileged access-identity management technology (PAM or PIM) although there is progress because privileged user access is at the top of senior management’s agenda.

RecommendationsRecommendations

Address BYOD and mobile data protection concerns through improved data monitoring and increasing data protection through encryption.

Implement Risk-Based StrategiesImplement Risk-Based Strategies

Rather than spreading funds across a wide range of security protection solutions, the report recommends risk-based strategies for the protection of sensitive data, monitoring and reporting on usage, and controlling user access, including encryption-based data protection and protecting data in transit between corporate systems.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.