Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

Survey: Small Firms Recognize Insider Risk, But Don't Act

Symantec report finds most breaches at small to midsize businesses caused by people, not malware

More than two-thirds of small to midsize businesses admitted that human error or deliberate sabotage by their employees was the cause of a data breach at their companies, according to a new survey released today by Symantec.

And nearly 80 percent pointed to the loss of a device or backup tape as another breach source, indicating that malicious, clumsy, or forgetful employees are the cause of a huge amount of lost data each year.

So what are these companies doing to do to protect themselves? Not nearly as much as they could : Lack of staff and human bandwidth are key reasons for a lack of security action, they claim, along with budget concerns that are heightened in these tight financial times.

The survey, conducted by Applied Research and commissioned by Symantec, garnered responses from 400 North American IT professionals (more than 1,400 worldwide), including companies with as many as 500 employees -- though the largest group of returns came from companies with less than 100 people. While the survey was not focused solely on insider security risks, the extent to which a variety of insider-oriented threats are a source of concern was notable.

While "insider attacks" garnered low concern rates relative to other threats -- with 57 percent saying they were "extremely concerned" or "somewhat concerned" -- data losses via email and USB devices scored much higher on the worry scale, with about 68 percent saying that each was a concern. Factor in responses with an employee-driven component -- including the loss of a laptop or mobile device containing confidential data, response to phishing scams, and data breaches -- and the number of firms concerned by insider or insider-related threats was overwhelming.

Despite another recent report in which most security professionals said insider threats were far more worrisome that external threats, the Symantic report reveals that virus infection remains the single greatest security concern in the minds of small-business managers. While this is understandable in light of the tremendous recent press coverage of the Conficker worm, it flies in the face of companies' data breach experiences.

Kevin Murray, senior director of security product marketing for Symantec, says the survey tells a story of gaps. "Management at small and medium businesses understand that security is important, but they're not acting, and those gaps in action cause breaches," Murray says.

According to Symantec, nearly 60 percent of small and midsize companies have endpoint protection -- defined in the survey as comprehensive workstation and mobile platform security tools that might include encryption, IDS/IPS functionality, firewall software, employee monitoring, and antimalware functionality. Almost half do not have backup and recovery capabilities for their workstations, and more than one-third do not have a backup and recovery program in place for their servers.

This gap may be related to the nature of small businesses: More than 40 percent of the surveyed businesses, for example, do not have dedicated IT staff; one-quarter said company managers or executives look after IT issues. General employee IT skills and awareness are also key issues, with almost 75 percent listing one of them as barriers to greater security. Budget was also listed as an impediment to greater security, since the median IT security budget was $4,500 among the respondents.

And yet another gap: Nine of out 10 companies said their IT security budgets will grow or stay the same in the next year. "They say that their budgets are a reason not to act, but at the same time they say that their budgets are growing," Murray says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9351
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the a...
CVE-2020-9352
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter.
CVE-2020-9353
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML ...
CVE-2020-9354
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. pat...
CVE-2020-9355
PUBLISHED: 2020-02-23
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.