Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Phishing

2/27/2019
10:40 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Weak Human Link Still Main Enterprise Security Concern

KnowBe4 study confirms what we pretty much knew already.

KnowBe4, a Florida company that claims to be "the world's largest integrated security awareness training and simulated phishing platform," wants to know what keeps enterprise security people awake with worry.

They even issued a report on it: "What Keeps You Up at Night -- The 2019 Report." It's easy to cynically dismiss this kind of report as just their market research tarted up, but releasing it to the public may actually help the security community understand what concerns other security professionals.

KnowBe4 had over 350 organizations globally participating in this year's report, across many verticals and differing size of organization.

It's not surprising that the top issues found by the report are ones that have been previously seen.

Users are the primary concern for 92% of organizations. Negligent users that become phishing attack victims tops the "up at night" list.

Data breaches seem to be a rampant problem all over the world. Ninety-five percent of organizations are worried about breach repercussions.

Attackers utilizing of compromised credentials is a common tactic. Ninety-three percent of organizations said that they are aware of the problem yet need to take steps to combat it.

GDPR compliance worries 64% of organizations even though there has been adequate time to formulate their policies. Having an adequate security budget is a concern for 75% of organizations.

Finally, security awareness training (along with phishing testing) topped the list of security initiatives 80% of respondents say that they need to implement.

The report found that most respondents are concerned about the combination of negligent or careless users and their impact on the organization when attacks like phishing or ransomware occur. Compromised credentials, breached data and access to the corporate network all topped the list of repercussions from these kinds of user responses.

Data breaches were the primary issue most organizations are concerned about, with credential compromise coming in as a close second. A layered security strategy that involves using multiple types of solutions at various parts of an attack was perceived as providing the greatest levels of organizational protection. With seven or more initiatives working, respondents did not report a concern about the 11 most common attack types.

The negligent user was the single largest concern to organizations found by the report. Since the top three open-ended concern answers of the report were users, phishing and email, this seems logical. A security culture and users sharing passwords were tied for a very close second place. Malicious insiders, while still a concern, ranked lower than that of the negligent user.

Budget was another major concern. If a lack of budget was indicated, the average responder had less than two of the 11 security initiatives in place and an elevated levels of concern about all of the areas that were covered in the report.

Lack of an "executive buy-in" was also found to be a major worry point. Fifty-nine percent said they don't have enough support. Of course, educating the C-suite as to how a lack of security can have negative business effects can help in this area.

In short, the kinds of worries the report elucidates are common to many security teams. Whatever the size of the enterprise, security continues to be a worry.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.