Vulnerabilities / Threats

6/26/2015
09:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey Shows Insider Threats on the Rise: Organizations Experience an Average of 3.8 Attacks per Year

Survey by Crowd Research Partners Shows Endpoints Are by Far the Most Common Launch Point for an Insider Attack; Highlights Need for Robust Endpoint Security and Policies

VERO BEACH, FL − (June 24, 2015)SpectorSoft™, a leader in the user activity monitoring and behavior analysis market, today released results of the Insider Threat Report, a crowd-based research project that was done in cooperation with the 260,000+ member Information Security Community on LinkedIn and Crowd Research Partners to gain more insight into the state of insider threats and solutions to prevent them. The final report results were based on a comprehensive survey of over 500 cybersecurity professionals from organizations of varying sizes across many industries; the results highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats.

Among the report’s findings:

The Rise of Insider Attacks: A majority of security professionals (62 percent) saw a rise in insider attacks over the last 12 months, while 22 percent saw no rise, and 16 percent were unsure if they had been attacked or not.

Frequency of Insider Attacks: Forty-five percent of respondents cannot determine whether their organizations experienced insider attacks in the last 12 months. Twenty-two percent said they experienced between one and five attacks, and 24 percent of organizations believe they experienced no attacks at all. Of the respondents who were willing to admit they suffered an insider attack, the average number was 3.8 incidents per organization per year.

Cost of Remediation: The overall average cost of remediating a successful insider attack is around $445,000. With an average risk of 3.8 insider attacks per year, the total remediation cost of insider attacks can quickly run into the millions of dollars.

Monitor Insider Activity on the Endpoint: The survey highlights the need for robust endpoint security and policies; respondents identified endpoints as the most common launch point for insider attacks (56 percent); this was followed by networks (43 percent) and mobile devices (42 percent).

Top Insider Threats: Organizations overwhelmingly maintained that data loss was the top concern regarding insider threats. When asked which types of insider attacks were most concerning, 63 percent of respondents said data leaks, 57 percent said inadvertent data breaches and 53 percent said malicious data breaches.

Vulnerable Data: Sixty-four percent of respondents feel extremely, very or moderately vulnerable to insider threats.Due to its value to attackers, the most vulnerable type of data is customer data (57 percent). This was closely followed by intellectual property (54 percent) and financial data (52 percent).

Internal versus External Attacks: Sixty-two percent of respondents find it more difficult to detect internal threats than external threats, while 38 percent cannot determine which type of threat is most difficult to detect.

Monitoring the Threat: When it comes to threat monitoring, 75 percent of companies monitor the security controls of their applications, 60 percent monitor a majority of all of their key IT assets, while only 21 percent continuously monitor user behavior taking place on their networks.

“The survey and report called out a rise in insider threats, the difficulty in detecting them, and the significant costs in cleaning up after a successful insider attack,” said Mike Tierney, COO, SpectorSoft.  “Companies need the ability to detect for anomalies in user behavior to make sure they are aware of the threats that exist within their organizations, because insiders will deviate from their normal behavior patterns when planning and executing an attack.” 

 

About SpectorSoft

SpectorSoft is the leader in user activity monitoring and an innovator in user behavior analysis software. SpectorSoft has helped more than 36,000 businesses, government organizations, schools and law enforcement agencies improve how they address security and achieve compliance. SpectorSoft award-winning solutions include enterprise-grade insider threat detection software, a powerful user activity monitoring solution deployed by thousands of companies in more than 110 countries, robust Event and Security Log Management, and the world’s leading employee investigation tool. For more information, please visit www.spectorsoft.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.