It’s well known that insiders pose a significant threat to enterprise security.
Many enterprises consider the insider threat to be the insider gone wrong - someone willing and ready to steal data to sell to competitors or criminals. But that’s not the only risk case when it comes to insiders. There’s also the real risk of what IDC calls the “hapless” user, which is an insider, such as an employee, contractor, or other authorized user, who increases information security risks by carelessness. This could be inadvertently clicking on a phishing email, using a rogue wireless network, visiting dangerous places such as websites or peer to peer sharing, sharing passwords – all the bad computer hygiene most of us know we should avoid, but many don’t.
A study released last week, conducted by IDC and sponsored by Splunk, found that “account takeover as a result of the hapless user remains one of the primary vectors for security breaches in organizations.” But IDC concluded that traditional approaches to security don’t adequately address this risk.
The survey results are based on the querying of 400 organizations with more than 1,000 employees based in the U.K., France, Germany, Sweden and the Netherlands. Key findings from the study:
We know that there’s no way to protect the enterprise against every “hapless” action a user may take. And as good as anti-malware and security defenses are, some stuff will get through, especially if users do things that make systems vulnerable. So, breaches are going to happen. That’s what makes IDC’s last point the most important: while defensive technologies are absolutely essential, they are not enough. Enterprises need the ability to identify and quickly respond to data breaches if they’re going to defend themselves against malicious criminals, ill-intended insiders, and even the hapless user who clicks on phishing emails.
tags
George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.
View all postsDon’t miss out on exclusive content and exciting announcements!