Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


IDC Report: Most Insider Leaks Happen By Accident

Unintentional leaks may cause more damage than internal fraud, research study says

Accidental security leaks happen more frequently and cause more damage than malicious insiders, according to a study published earlier today by an industry research firm.

According to a report (PDF) issued by research firm IDC and sponsored by RSA, 52 percent of respondents characterized their insider threat incidents as predominantly accidental, while only 19 percent believed the threats were deliberate. Twenty-six percent believed their insider issues were an equal combination of accidental and malicious threats, while 3 percent were unsure.

"One of the things that jumped out at us from the study was how many insider incidents are unintentional," says Chris Young, senior vice president of RSA products. "These are individual actors who often are just trying to do their jobs and don't understand that what they are doing is dangerous."

Almost 82 percent of CXOs were unsure if incidents caused by contractors and temporary staff were accidental or deliberate, the study says.

"Employers view their relationship with employees as one of trust and recognize their people are their biggest asset," said Chris Christiansen, program vice president of security products at IDC. "But the vast nature of an organization's infrastructure, coupled with a dispersed, often global, employee base and complex internal user mix of employees, consultants, partners, and outsourcers make addressing the risks posed by its internal users the biggest security challenge that CXOs currently face. Whether the risk is intentional or not, it's there. It's real."

In the previous 12 months, the 400 respondents in the study admitted to 6,244 incidents of unintentional data loss, 5,830 malware/spyware attacks from within the enterprise, and 5,794 incidents of risks created by excessive privilege and access control rights. The number of internal security incidents totaled 57,485 for the year.

Almost 40 percent of organizations plan to increase spending on internal security risks during the next 12 months; only 6 percent said they will decrease spending.

One of the most common offenses in enterprises is the maintenance of expired user accounts, the study says.

"Out-of-date and/or excessive privilege and access control rights for users are viewed as having the most financial impact on organizations," IDC says. "In years past, IDC has estimated that as many as 60 percent of all accounts on most systems are expired. This large number of expired accounts means that insiders who no longer have a relationship with the firm continue to use the firm's IT resources, [such as] network, email, applications, and data.

"Other insiders can also use these expired accounts to misrepresent themselves and/or harass other employees, defraud the firm, or commit illegal acts against the firm's partners," the study continues. "Needless to say, expired accounts are a significant issue in failed audits."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...