Vulnerabilities / Threats

8/1/2018
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Research Reveals Major Insider Threat Disconnect in the Workplace: ObserveIT

Majority of respondents say they understand the definition of an insider threat, but data shows the insider threat risk is growing rapidly.

BOSTON – August 1, 2018 – ObserveIT, the leading insider threat management provider with more than 1,700 customers around the world, today released the Multigenerational Workforce and Insider Threat Risk study that reveals the disconnect between cybersecurity awareness and insider threat risk, and the differences in generational cybersecurity awareness within the workplace. ObserveIT surveyed more than 1,000 full-time employees ages 18-65+ at organizations with more than 500 employees on their understanding and awareness of cybersecurity programs. The results show the majority (65 percent) of respondents reported they understand the definition of an insider threat.

The data indicates 64 percent of respondents agree careless employees or contractors are the most common cause of insider threats. This directly correlates with recent data from the Ponemon Institute showing negligent insider actions caused 64 percent of all insider threat incidents in the past 12 months.

The Ponemon data also shows the risk posed by insider threats is growing year-over-year. Since 2016, the average number of incidents involving employee or contractor negligence has increased by 26 percent and the cost to contain an incident in North America has risen to $11.01 million.

The fact that employees self-report understanding insider threats and adhering to cybersecurity policies, while insider threat-related incidents continue to rise, indicates organizations may have a false sense of security based on their expectations of employees’ understanding of insider threats. Lack of consistent understanding around the risks posed by insider threat activity can introduce accidental or negligent insider threat behavior within the workplace. And, the increased risk of insider threats is costing organizations significant money and resources as these threats can be difficult to detect, identify and prevent without the right processes and technology in place.

“While the threat of the insider continues to grow, this research proves that when it comes to cybersecurity awareness and insider threat prevention, organizations need to take a holistic approach to cybersecurity and focus on people first, then processes and technology,” said ObserveIT CEO Mike McKee. “With a new generation entering the workforce, organizations should increase security awareness training for new hires and implement processes and technology to ensure both employees and contractors with access to systems and data understand and adhere to the company cybersecurity policy to prevent insider threats.” 

Key findings from the survey include:

  • The Risk of the Accidental Insider: Almost two-thirds (61 percent) of respondents say they know what an insider threat is. However, this points to the dangers posed by naïve employees who may not understand the hidden dangers of insider threats, or who may only define insider threats as purely malicious in intent rather than malicious and negligent behavior.
  • The Generational Divide: Generation X and Baby Boomers are the least risky generations within the workplace, as 90 percent of 45-54 year olds and 55-64 year olds report they follow their company’s cybersecurity policy.
  • Entrants to the Workforce Present Challenges: Generation Z poses the highest overall cybersecurity risk to organizations, as more than one-third (34 percent) of 18-24 year olds report that they don’t know nor understand what is included within their company’s cybersecurity policy. This group was also the most likely of any generation to report that they do not follow their company’s cybersecurity policy, even if they do understand it.  

To review the results of ObserveIT’s Multigenerational Workforce and Insider Threat Risk study, visit here.

For more information on ObserveIT and to review the 2018 Ponemon Institute Cost of Insider Threats: Global Organizations study, visit here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3937
PUBLISHED: 2018-08-14
An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability...
CVE-2018-3938
PUBLISHED: 2018-08-14
An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST r...
CVE-2018-12537
PUBLISHED: 2018-08-14
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
CVE-2018-12539
PUBLISHED: 2018-08-14
In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows,...
CVE-2018-3615
PUBLISHED: 2018-08-14
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.