Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Deep Threat

Insiders pose increasing danger to safety of corporate data, according to two new studies published today

Enterprises are leaking an increasing amount of data from the inside, and they aren't sure what to do about it.

Those are the conclusions of two new studies -- one from the Ponemon Institute and one from Enterprise Strategy Group -- being published today. Both of the reports suggest that enterprises should be shifting their security attention from the outside to the inside.

"The insider threat is far and away the number one threat," says Eric Ogren, an analyst at Enterprise Strategy Group and one of the authors of the research.

The new Enterprise Strategy Group report found that one third of the enterprises surveyed had experienced a loss of sensitive data in the last 12 months, while another 11 percent were unsure whether a breach occurred.

According to the new Ponemon study, nearly 60 percent of U.S.-based businesses and government agencies believe they are unable to effectively assess or quantify insider threat risks within their organizations, leaving them open to privacy breaches, failed audits, and potential fraud or misuse of data.

While the two reports arrive at similar views on the current state of internal security, they offer different recommendations on how enterprises should respond. The Enterprise Strategy Group study, which was sponsored by information monitoring and protection appliance vendor Reconnex, suggests that 90 percent of companies queried a plan to deploy new technologies to secure their intellectual property in the next 12 months.

"I'm very surprised [at that statistic]," Ogren says. "That's a huge number."

Fifty-eight percent of companies believe the biggest threat to their data is from the inside, the ESG study says. While most companies focus their insider threat prevention efforts on email security, they should be looking at other means of access as well, the study says. One third of companies' sensitive data and IP exists in application databases, where it can be centrally secured and managed, and an additional 28 percent resides in file systems, according to the report.

There are still some organizations that do not inspect such obvious and well-documented leak points as Webmail and IM communications, according to ESG.

The Ponemon study, which was sponsored by identity management vendor SailPoint Technologies, points to inefficient processes, insufficient data, and the lack of collaboration between business and IT groups as the leading causes of risk across the enterprise.

Sixty-four percent of respondents say they have deployed an identity and access management (IAM) solution, including access control, password management, provisioning, and role management. But almost 60 percent of respondents say their companies are unable to effectively focus IAM controls on areas of the greatest business risk, the report states.

Although respondents to the Ponemon study said that responsibility for identity compliance is shared across business groups, IT, and audit/compliance groups, collaboration among them is actually very weak. Forty-two percent of respondents say that collaboration rarely occurs, while another 23 percent say it never occurs.

"In order to assess risk, and identify and address identity management shortcomings, organizations must have access to data and appropriate coordination across business units," said Larry Ponemon, chairman and founder of the Ponemon Institute. "Our research shows that, for too many companies, this is simply not happening."

— Tim Wilson, Site Editor, Dark Reading

  • Reconnex Corp.
  • SailPoint Technologies Inc. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 5/28/2020
    The Problem with Artificial Intelligence in Security
    Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
    10 iOS Security Tips to Lock Down Your iPhone
    Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-05-28
    An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.
    PUBLISHED: 2020-05-28
    In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
    PUBLISHED: 2020-05-28
    Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time wi...
    PUBLISHED: 2020-05-28
    CMS Made Simple through 2.2.14 allows XSS via a crafted File Picker profile name.
    PUBLISHED: 2020-05-28
    node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.