Your one-stop web resource providing safety and security information to manufacturers

There are major gaps between existing security processes and the technologies currently in place to address insider threats, a new study found.

Only 27 percent of respondents block privileged user access to data, a proven method of mitigating insider attacks, while 66 percent of respondents use perimeter focused network intrusion detection and prevention tools to identify and prevent insider threats although these tools were not for insider threat detection but to protect from external threats, according to a Vormetric study of 700 IT security decision-makers.

Insiders are the Real Threat: Report
Cost of Cyber Crime Skyrockets
Threats: Manufacturers use ‘Yesterday’s Technology’
Cost of Cyber Crime Skyrockets

“The data is clear – IT decision-makers are concerned about insider threats and data breaches, but tend to rely on perimeter and network security focused tools today, rather than securing the data at its source,” said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. “What this research highlights is that large organizations need a data-centric security strategy. Insider attacks are increasingly difficult to prevent and detect, and the research findings reveal the need for a change in approach.”

The more forward looking and sophisticated organizations were using technology approaches proven against malicious insiders, or malware attacks that compromise insider credentials such as APTs, but were in the minority:
• Only 40 percent are monitoring privileged user activities, with just 27 percent blocking privileged user access
• Nearly half (48 percent) of organizations only review sensitive data access monthly and 76 percent admit to not being proficient at detecting anomalous data access behavior in real-time.

Cyber Security

Yet the results also show enterprises still focus protections toward the perimeter:
• Network traffic monitoring is the most-used tool to identify and prevent data breaches (56 percent)
• Laptops and desktops are the biggest threat (49 percent)
• Two thirds (66 percent) use or intend to use Intrusion Detection/Prevention Systems (IDP/IPS) to supplement network traffic monitoring and detect and prevent insider attacks.

Attitudes and protection plans are changing, with 45 percent of organizations reporting that Edward Snowden has caused them to be more aware of insider threats and over half (53 percent) are increasing their security budgets to offset the problem in the next year. Many of those investments will go into additional protections for data, with 78 percent either already using or planning to use data encryption and an additional 70 percent already using or planning to use data access controls.

“It’s clear that organizations of all kinds are concerned with securing access to sensitive data,” said Alan Kessler, chief executive of Vormetric. “While many of the respondents are using more of the right security technologies and tools to help reduce their attack surface, a much larger group is falling short in taking the additional step to protect from insider threats and thwart attacks such as APTs that steal insider credentials.”

Pin It on Pinterest

Share This