Vulnerabilities / Threats

8/1/2018
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Research Reveals Major Insider Threat Disconnect in the Workplace: ObserveIT

Majority of respondents say they understand the definition of an insider threat, but data shows the insider threat risk is growing rapidly.

BOSTON – August 1, 2018 – ObserveIT, the leading insider threat management provider with more than 1,700 customers around the world, today released the Multigenerational Workforce and Insider Threat Risk study that reveals the disconnect between cybersecurity awareness and insider threat risk, and the differences in generational cybersecurity awareness within the workplace. ObserveIT surveyed more than 1,000 full-time employees ages 18-65+ at organizations with more than 500 employees on their understanding and awareness of cybersecurity programs. The results show the majority (65 percent) of respondents reported they understand the definition of an insider threat.

The data indicates 64 percent of respondents agree careless employees or contractors are the most common cause of insider threats. This directly correlates with recent data from the Ponemon Institute showing negligent insider actions caused 64 percent of all insider threat incidents in the past 12 months.

The Ponemon data also shows the risk posed by insider threats is growing year-over-year. Since 2016, the average number of incidents involving employee or contractor negligence has increased by 26 percent and the cost to contain an incident in North America has risen to $11.01 million.

The fact that employees self-report understanding insider threats and adhering to cybersecurity policies, while insider threat-related incidents continue to rise, indicates organizations may have a false sense of security based on their expectations of employees’ understanding of insider threats. Lack of consistent understanding around the risks posed by insider threat activity can introduce accidental or negligent insider threat behavior within the workplace. And, the increased risk of insider threats is costing organizations significant money and resources as these threats can be difficult to detect, identify and prevent without the right processes and technology in place.

“While the threat of the insider continues to grow, this research proves that when it comes to cybersecurity awareness and insider threat prevention, organizations need to take a holistic approach to cybersecurity and focus on people first, then processes and technology,” said ObserveIT CEO Mike McKee. “With a new generation entering the workforce, organizations should increase security awareness training for new hires and implement processes and technology to ensure both employees and contractors with access to systems and data understand and adhere to the company cybersecurity policy to prevent insider threats.” 

Key findings from the survey include:

  • The Risk of the Accidental Insider: Almost two-thirds (61 percent) of respondents say they know what an insider threat is. However, this points to the dangers posed by naïve employees who may not understand the hidden dangers of insider threats, or who may only define insider threats as purely malicious in intent rather than malicious and negligent behavior.
  • The Generational Divide: Generation X and Baby Boomers are the least risky generations within the workplace, as 90 percent of 45-54 year olds and 55-64 year olds report they follow their company’s cybersecurity policy.
  • Entrants to the Workforce Present Challenges: Generation Z poses the highest overall cybersecurity risk to organizations, as more than one-third (34 percent) of 18-24 year olds report that they don’t know nor understand what is included within their company’s cybersecurity policy. This group was also the most likely of any generation to report that they do not follow their company’s cybersecurity policy, even if they do understand it.  

To review the results of ObserveIT’s Multigenerational Workforce and Insider Threat Risk study, visit here.

For more information on ObserveIT and to review the 2018 Ponemon Institute Cost of Insider Threats: Global Organizations study, visit here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.
CVE-2018-18377
PUBLISHED: 2018-10-16
goform/setReset on Orange AirBox Y858_FL_01.16_04 devices allows attackers to reset a router to factory settings, which can be used to login using the default admin:admin credentials.
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.