Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



10:40 AM
Larry Loeb
Larry Loeb
Larry Loeb

Weak Human Link Still Main Enterprise Security Concern

KnowBe4 study confirms what we pretty much knew already.

KnowBe4, a Florida company that claims to be "the world's largest integrated security awareness training and simulated phishing platform," wants to know what keeps enterprise security people awake with worry.

They even issued a report on it: "What Keeps You Up at Night -- The 2019 Report." It's easy to cynically dismiss this kind of report as just their market research tarted up, but releasing it to the public may actually help the security community understand what concerns other security professionals.

KnowBe4 had over 350 organizations globally participating in this year's report, across many verticals and differing size of organization.

It's not surprising that the top issues found by the report are ones that have been previously seen.

Users are the primary concern for 92% of organizations. Negligent users that become phishing attack victims tops the "up at night" list.

Data breaches seem to be a rampant problem all over the world. Ninety-five percent of organizations are worried about breach repercussions.

Attackers utilizing of compromised credentials is a common tactic. Ninety-three percent of organizations said that they are aware of the problem yet need to take steps to combat it.

GDPR compliance worries 64% of organizations even though there has been adequate time to formulate their policies. Having an adequate security budget is a concern for 75% of organizations.

Finally, security awareness training (along with phishing testing) topped the list of security initiatives 80% of respondents say that they need to implement.

The report found that most respondents are concerned about the combination of negligent or careless users and their impact on the organization when attacks like phishing or ransomware occur. Compromised credentials, breached data and access to the corporate network all topped the list of repercussions from these kinds of user responses.

Data breaches were the primary issue most organizations are concerned about, with credential compromise coming in as a close second. A layered security strategy that involves using multiple types of solutions at various parts of an attack was perceived as providing the greatest levels of organizational protection. With seven or more initiatives working, respondents did not report a concern about the 11 most common attack types.

The negligent user was the single largest concern to organizations found by the report. Since the top three open-ended concern answers of the report were users, phishing and email, this seems logical. A security culture and users sharing passwords were tied for a very close second place. Malicious insiders, while still a concern, ranked lower than that of the negligent user.

Budget was another major concern. If a lack of budget was indicated, the average responder had less than two of the 11 security initiatives in place and an elevated levels of concern about all of the areas that were covered in the report.

Lack of an "executive buy-in" was also found to be a major worry point. Fifty-nine percent said they don't have enough support. Of course, educating the C-suite as to how a lack of security can have negative business effects can help in this area.

In short, the kinds of worries the report elucidates are common to many security teams. Whatever the size of the enterprise, security continues to be a worry.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...