Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



10:40 AM
Larry Loeb
Larry Loeb
Larry Loeb

Weak Human Link Still Main Enterprise Security Concern

KnowBe4 study confirms what we pretty much knew already.

KnowBe4, a Florida company that claims to be "the world's largest integrated security awareness training and simulated phishing platform," wants to know what keeps enterprise security people awake with worry.

They even issued a report on it: "What Keeps You Up at Night -- The 2019 Report." It's easy to cynically dismiss this kind of report as just their market research tarted up, but releasing it to the public may actually help the security community understand what concerns other security professionals.

KnowBe4 had over 350 organizations globally participating in this year's report, across many verticals and differing size of organization.

It's not surprising that the top issues found by the report are ones that have been previously seen.

Users are the primary concern for 92% of organizations. Negligent users that become phishing attack victims tops the "up at night" list.

Data breaches seem to be a rampant problem all over the world. Ninety-five percent of organizations are worried about breach repercussions.

Attackers utilizing of compromised credentials is a common tactic. Ninety-three percent of organizations said that they are aware of the problem yet need to take steps to combat it.

GDPR compliance worries 64% of organizations even though there has been adequate time to formulate their policies. Having an adequate security budget is a concern for 75% of organizations.

Finally, security awareness training (along with phishing testing) topped the list of security initiatives 80% of respondents say that they need to implement.

The report found that most respondents are concerned about the combination of negligent or careless users and their impact on the organization when attacks like phishing or ransomware occur. Compromised credentials, breached data and access to the corporate network all topped the list of repercussions from these kinds of user responses.

Data breaches were the primary issue most organizations are concerned about, with credential compromise coming in as a close second. A layered security strategy that involves using multiple types of solutions at various parts of an attack was perceived as providing the greatest levels of organizational protection. With seven or more initiatives working, respondents did not report a concern about the 11 most common attack types.

The negligent user was the single largest concern to organizations found by the report. Since the top three open-ended concern answers of the report were users, phishing and email, this seems logical. A security culture and users sharing passwords were tied for a very close second place. Malicious insiders, while still a concern, ranked lower than that of the negligent user.

Budget was another major concern. If a lack of budget was indicated, the average responder had less than two of the 11 security initiatives in place and an elevated levels of concern about all of the areas that were covered in the report.

Lack of an "executive buy-in" was also found to be a major worry point. Fifty-nine percent said they don't have enough support. Of course, educating the C-suite as to how a lack of security can have negative business effects can help in this area.

In short, the kinds of worries the report elucidates are common to many security teams. Whatever the size of the enterprise, security continues to be a worry.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
Stephen Ward, VP, ThreatConnect,  7/1/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.
PUBLISHED: 2020-07-07
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user su...