The majority of organisations surveyed believe that attacks reaching the privileged account takeover stage are the most difficult to detect, respond to and remediate. While the NSA breach is widely regarded as the prototypical insider-based attack, and the retail/PoS breaches are regarded similarly for outside attacks, the critical link between both attacks was the compromise and exploitation of privileged credentials.
Key findings of the 2014 survey include:
Snowden and retail/PoS breaches have impacted security strategies the most
· When asked which cyberattacks or data breaches in the past year had the biggest impact on their business’ security strategy:
o 37% of respondents cited the NSA/Edward Snowden breach
o 31% of respondents cited the retail/PoS attacks
o 19% of respondents cited government-sponsored espionage
Third-party privileged access is a critical security vulnerability
· As companies move to the cloud and streamline the supply chain by providing routine network access to third-parties, cyberattackers are increasingly targeting these partners to steal and exploit their privileged access to the target company’s network. This pathway was used in some of the most devastating breaches in the last 12 months.
Key findings of the 2014 survey include:
Snowden and retail/PoS breaches have impacted security strategies the most
· When asked which cyberattacks or data breaches in the past year had the biggest impact on their business’ security strategy:
o 37% of respondents cited the NSA/Edward Snowden breach
o 31% of respondents cited the retail/PoS attacks
o 19% of respondents cited government-sponsored espionage
Third-party privileged access is a critical security vulnerability
· As companies move to the cloud and streamline the supply chain by providing routine network access to third-parties, cyberattackers are increasingly targeting these partners to steal and exploit their privileged access to the target company’s network. This pathway was used in some of the most devastating breaches in the last 12 months.
o 60% of businesses now allow third-party vendors remote access to their internal networks
o Of this group, 58% of organisations have no confidence that third-party vendors are securing and monitoring privileged access to their network
Attackers are on the inside
· Organisations continue to face sophisticated and determined attackers seeking to infiltrate networks. Many organisations face daily perimeter-oriented attacks, such as phishing, designed to give attackers a foothold to steal the privileged credentials of an employee to give them de facto insider status. The survey found:
o 52% of respondents believe that a cyberattacker is currently on their network, or has been in the past year
o 44% believe that attacks that reach the privileged account takeover stage are the most difficult to detect, respond to and remediate; 29% believe it is at the malware implantation stage
o Of this group, 58% of organisations have no confidence that third-party vendors are securing and monitoring privileged access to their network
Attackers are on the inside
· Organisations continue to face sophisticated and determined attackers seeking to infiltrate networks. Many organisations face daily perimeter-oriented attacks, such as phishing, designed to give attackers a foothold to steal the privileged credentials of an employee to give them de facto insider status. The survey found:
o 52% of respondents believe that a cyberattacker is currently on their network, or has been in the past year
o 44% believe that attacks that reach the privileged account takeover stage are the most difficult to detect, respond to and remediate; 29% believe it is at the malware implantation stage
Only one in three (31%) organisations globally have analytics-based security protection
· When asked whether their organisation had or was considering deploying security analytics, this year’s survey found that:
o 31% of businesses have already deployed security analytics in some form
o 23% were planning on deploying security analytics in the next 12 months
o 33% had no plans to leverage security analytics
“Loss of IP and competitive advantage, diminishing brand value, loss of customers and negative shareholder impact are just a few of the business impacts many organisations felt as a result of cyber-attacks this year,” said Adam Bosnian, EVP, CyberArk. “This year’s survey results demonstrate that whether it’s an insider like Edward Snowden, or an outside-based attack like the retail/PoS breaches, attackers require the exploitation of insider credentials to successfully execute their attacks.”
Read the full survey here.
o 31% of businesses have already deployed security analytics in some form
o 23% were planning on deploying security analytics in the next 12 months
o 33% had no plans to leverage security analytics
“Loss of IP and competitive advantage, diminishing brand value, loss of customers and negative shareholder impact are just a few of the business impacts many organisations felt as a result of cyber-attacks this year,” said Adam Bosnian, EVP, CyberArk. “This year’s survey results demonstrate that whether it’s an insider like Edward Snowden, or an outside-based attack like the retail/PoS breaches, attackers require the exploitation of insider credentials to successfully execute their attacks.”
Read the full survey here.
*The findings were developed through interviews with 373 C-level and IT security executives across North America, Europe and the Asia-Pacific. The full survey can be downloaded for free here.
No comments:
Post a Comment