IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines

IT Today is brought to you by Auerbach Publications

IT Performance Improvement

Management

Security

Networking and Telecommunications

Software Engineering

Project Management

Database


Free Subscription to IT Today





 
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks by Kenneth; ISBN 9781420046595
The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition by Rebecca Herold and Kevin Beaver; ISBN 978-1-4398-5558-4
Managing the Insider Threat: No Dark Corners by Nick Catrantzos; ISBN 9781439872925
Big Data: A Business and Legal Guide by James R. Kalyvas and Michael R. Overly: ISBN 978-1-4665-9237-7
Investigations in the Workplace, Second Edition by Eugene F. Ferraro; ISBN 9781439814802
Program Governance; ISBN 9781466568907

Widespread Employee Access to Sensitive Files Puts Critical Data at Risk

Insiders with Too Much Access Are Most Likely the Cause of Data Leakage, Reports Varonis-Sponsored Survey of More Than 2,000 Employees

London, UK - December 9, 2014 - Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they should not see, and more than half say that this access is frequent or very frequent.

As attention shifts from sophisticated external attacks to the role that internal vulnerability and negligence often play, a new survey commissioned by Varonis Systems, Inc. and conducted by the Ponemon Institute suggests that most organizations are having difficulty balancing the need for improved security with employee productivity demands. Employees with needlessly excessive data access privileges represent a growing risk for organizations due to both accidental and conscious exposure of sensitive or critical data.

The survey report, http://www.varonis.com/research/why-are-data-breaches-happening "Corporate Data: A Protected Asset or a Ticking Time Bomb?" is derived from interviews conducted in October 2014 with 2,276 employees in the United States, United Kingdom, France, and Germany. Respondents included 1,166 IT practitioners and 1,110 end users in organizations ranging in size from dozens to tens of thousands of employees, in a variety of industries including financial services, public sector, health & pharmaceutical, retail, industrial, and technology and software.

Dr. Larry Ponemon, Chairman and Founder of The Ponemon Institute, a leading research center dedicated to privacy, data protection and information security policy, observed, "Data breaches are rampant and increasing. The sheer growth of both digital information and our dependence on it can overwhelm organizations' attempts to protect their sensitive data. This research surfaces an important factor that is often overlooked: employees commonly have too much access to data, beyond what they need to do their jobs, and when that access is not tracked or audited, an attack that gains access to employee accounts can have devastating consequences. "

Lack of Control, Data Growth Hampering Productivity
Both IT practitioners and end users are witnessing a lack of control over employee access and use of company data, and the two groups generally concur that their organizations would overlook security risks before they would sacrifice productivity. Only 22 percent of employees surveyed believe their organizations as a whole place a very high priority on the protection of company data, and less than half of employees believe their organizations strictly enforce security policies related to use of and access to company data. Further, the proliferation of business data is already negatively impacting productivity ? making it harder for employees to find data they truly need and should be able to access, and to share appropriate data with customers, vendors and business partners.

Other key findings on control and oversight include:

  • 71 percent of end users say that they have access to company data they should not be able to see.
  • 54 percent of those end users who have access they shouldn't characterize that access as frequent or very frequent.
  • 4 in 5 IT practitioners (80 percent) say their organizations don't enforce a strict least-privilege (or need-to-know) data model.
  • Only 22 percent of employees say their organization is able to tell them what happened to lost data, files or emails.
  • 48 percent of IT practitioners say they either permit end users to use public cloud file sync services or permission is not required.
  • 73 percent of end users believe the growth of emails, presentations, multimedia files and other types of company data has very significantly or significantly affected their ability to find and access data.
  • 43 percent of end users say it takes weeks, months or longer to be granted access to data they request access to in order to do their jobs, and only 22 percent report that access is typically granted within minutes or hours.
  • 60 percent of IT practitioners say it is very difficult or difficult for employees to search and find company data or files they or their co-workers have created that isn't stored on their own computers.
  • 68 percent of end users say it is difficult or very difficult to share appropriate data or files with business partners such as customers or vendors.

Uncovering Internal Vulnerability
The findings also convey that both IT practitioners and end users agree that the compromise of employee accounts that can lead to external data breaches are most likely to be caused by insiders with too much access who are frequently unaware of the risks that they present. 50 percent of end users and 74 percent of IT practitioners believe that insider mistakes, negligence or malice are frequently or very frequently the cause of leakage of company data. And only 47 percent of IT practitioners say employees in their organizations take appropriate steps to protect the company data they access. When permissions management and auditing capabilities are not in place, employees' excessive access to data and their negligence for security are increasingly putting company data at risk.

Other key findings on root causes of data breaches include:

  • 76 percent of end users say their job requires them to access and use proprietary information such as customer data, employee records, financial reports, and confidential business documents.
  • 38 percent of end users report that they and their co-workers can see "a lot of data" that they believe they should not have access to.
  • Only 47 percent of IT professionals say end users in their organizations are taking appropriate steps to protect company data accessed by them.
  • 76 percent of end users believe there are times when it is acceptable to transfer work documents to their personal devices, while only 13 percent of IT practitioners agree.
  • 49 percent of IT practitioners say it is not likely or there is no chance that when documents, files or emails are lost or change unexpectedly, the organization will be able to assess what happened to them.
  • 67 percent of IT practitioners say their organization experienced the loss or theft of company data over the past two years, while only 44 percent of end users believe this has happened.

Yaki Faitelson, Varonis Co-Founder and CEO, said, "These findings should be a wake-up call to any organization that stores information about its customers, employees or business partners, which means almost any business or institution in today's world. There has been so much focus and investment on protecting the perimeter, but the most fundamental building blocks of security that protect the data inside - access controls and auditing - are often left behind. Unnecessary access combined with a lack of auditing capability adds up to inevitable disaster. Now we see that lack of control and oversight is impacting employee productivity as well, as they struggle to find and get access to data and share it easily and securely with business partners."

Add a Comment

Name:

Comment:


© Copyright 2014 Auerbach Publications