Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

The current threat landscape: How to prepare and protect your organisation

By Karl Lankford, Director of Solutions Engineering, BeyondTrust

by The Gurus
November 7, 2019
in Featured
By Karl Lankford, Director of Solutions Engineering, BeyondTrust
Share on FacebookShare on Twitter

The world is an uncertain place, particularly for cybersecurity professionals – many of whom have learned the hard way that they can’t rest on their laurels. While new technologies and methods of attack are always emerging, threats are constantly attacking organisations from both outside and in. In an age where a cybersecurity incident is both imminent and expected, IT professionals need to know what to look out for and, crucially, how to best prepare for a security event.

The threat from within

When you hear the phrase ‘cyber threat’, it’s natural to imagine a nefarious outsider carrying out an external attack. Yet, the reality is that compromised access from employees is one of the biggest risks facing businesses right now.

In the UK, poor security hygiene by employees continues to be a challenge for most organisations. According to the 2019 Privileged Access Threat Report, staff sending files to personal email accounts, for example, was cited as an issue by 64% of UK IT professionals, while colleagues telling each other passwords was a concern for 65%. The report also highlighted that over a third (35%) are worried about unintended data loss when employees use unsecured devices, and while 72% of IT professionals agree that their businesses would be more secure if they restricted employee device access, this isn’t usually realistic or a viable solution, let alone conducive to productivity.

Both internal employees and third-party vendors need privileged access to be able to do their jobs effectively, but require this access granted in a way that doesn’t compromise security or impede productivity. In the face of growing threats, there has never been a greater need to implement organisation-wide strategies and solutions to manage and control privileged access in a way that fits the needs of the user.

Continual employee education around best practices is vital, but privileged access management (PAM) tools can also help, especially since many of the insecure employee behaviours are easily preventable with the right password security solutions.

What’s driving policy: internal problems or external factors?

With GDPR coming into effect last year, it’s unsurprising that last year’s report found that compliance was one of the biggest drivers of cybersecurity strategies, however this year’s survey has found that high profile security breaches is the leading driver. Almost half (43%) say that high-profile security breaches outside of their business, are having a significant effect on the way they’re governing employee access, while GDPR compliancy is taking a backseat as third most important (41%). Meanwhile, 42% cite concern of unintended data loss from unsecured data devices as driving their policies on employee network access.

The report also found that the risks associated with the Internet of Things (IoT) posed a big concern for the professionals surveyed, with 61% of UK businesses citing that IoT devices pose a threat to security. Despite this, a majority (80%) are confident they know how many IoT devices are accessing their systems, and 81% are confident they know how many individual logins can be attributed to these devices. At the same time, 41% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies.

More vendors, more exposure, less confidence

Many IT teams struggle enough in managing identities and privileged access within their organisation. However, IT security professionals must also control vendor access.

As the vendor ecosystem grows, the threat landscape evolves and users should be granted specific role-based privileges. Organisations need to accept that the way to mitigate risks is by managing privileged accounts through integrated technology and automated processes that not only save time, but also provide visibility across the environment. By implementing cybersecurity policies and solutions that also speed business efficiency, versus putting roadblocks in users’ way, organisations can begin to tackle the privileged access problem.

Ideally, a business’ own security best practices should also be extended to the vendors it works with. 46% of UK organisations say they have more than 100 vendors logging in regularly, highlighting the sheer scope of risk exposure, with 83% admitting they trust third party vendors accessing their networks, a slight increase to last year’s report. Trust in employee privileged access was cited at 87% however, a decrease of trust from last year which was 91%.

In an age where data breaches have immense financial and reputational implications for businesses, it’s a stark reminder that UK organisations need to do more to assess the level of trust they place in their third-party vendors.

How to combat cyber threats

So, what strategies are IT leaders implementing to address the diverse array of privileged access challenges, and what has been effective? The report did show that some organisations are managing these risks with a PAM solution. From the research, these same organisations experience less severe security breaches and have better visibility and control than those who use manual solutions or no solution at all. In fact, 90% of UK organisations with fully integrated PAM tools are confident they can identify specific threats from employees with privileged access.

The next big issues in cybersecurity threat management

Although the level of perceived threat has remained fairly consistent for both insiders and vendors, the threat landscape itself continues to evolve with a number of emerging threats that need to be considered. New technologies and platforms often introduce new risks. Artificial intelligence (AI), for example, promises many benefits but there are still many assumptions made about what the actual outcomes look like for organisations.

As we approach the next decade, issues around employee and vendor access are not going away. As long as businesses have data and IT assets to protect, new threats will continue to emerge. Yet, as 2019’s report has made clear, it is possible to improve the visibility of threats and increase the confidence over an IT environment’s security. With an appropriate number of well-integrated PAM solutions, businesses can gain greater visibility and control of privileged insiders and third-party vendors, and all without disrupting productivity. A PAM solution implemented with the user experience in mind, can enable the automated management of privileged access and remote access, while minimising the vulnerabilities caused by employees and vendors. Combined with continual education and intelligent device management, this gives organisations control and visibility of their privileged access, helping them to protect critical data and systems.

FacebookTweetLinkedIn
Share1TweetShare
Previous Post

Singapore citizen charged for Amazon AWS Cryptomining Fraud

Next Post

Volusion data breach impacts 6,500 sites

Recent News

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023
Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information