Endpoint

3/22/2016
02:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey: Employees would sell password for $1000

SailPoint released a survey today that reveals that 1 in 5 employees would sell their work passwords to a third-party organization, as compared to 1 in 7 last year. Of those who would sell their passwords, 44% would do it for less than $1000, and some for less than $100. Compounding this is the fact that 65% use a single password among applications and 32% share passwords with co-workers.

The data comes from a survey of 1,000 office workers at large organizations (averaging 50,000 employees) globally. This year’s survey results show a measurable disconnect between employees’ growing concern over the security of their personal information and the negligence over their data security practices in the workplace. Other interesting findings:

·         More than 2 in 5 employees still have corporate account access after they leave their job

  • 26% uploaded sensitive info to cloud apps with the specific intent to share data outside the company
  • 1 in 3 employees purchased a SaaS app without IT’s knowledge, a 55% increase from last year

This is the 8th year SailPoint conducted this survey, which is designed to measure how employees view their individual role in their companies’ security processes, and what (if any) improvements are being made by organizations to adapt to the new business realities where cyber security perimeters no longer exist.

You can find the release here, and see the full report attached. If you have any questions, please let me know!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-15137
PUBLISHED: 2018-07-16
The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.
CVE-2017-17541
PUBLISHED: 2018-07-16
A Cross-site Scripting (XSS) vulnerability in Fortinet FortiManager 6.0.0, 5.6.4 and below versions, FortiAnalyzer 6.0.0, 5.6.4 and below versions allows inject Javascript code and HTML tags through the CN value of CA and CRL certificates via the import CA and CRL certificates feature.
CVE-2018-1046
PUBLISHED: 2018-07-16
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow ...
CVE-2018-10840
PUBLISHED: 2018-07-16
Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.
CVE-2018-10857
PUBLISHED: 2018-07-16
git-annex is vulnerable to a private data exposure and exfiltration attack. It could expose the content of files located outside the git-annex repository, or content from a private web server on localhost or the LAN.