Most companies are clueless when it comes to stopping insider threats

cybersecurity
Image Credit: Shutterstock (Image credit: Shutterstock)

Most companies are failing to guard against internal threats in the same way they shield against external attackers, a new report from cybersecurity firm Imperva suggests.

There are numerous reasons for this behavior, from budget constraints, to the lack of in-house expertise. However, many companies are simply oblivious to the dangers posed by insider threats.

Imperva surveyed 464 security and IT professionals with responsibility for managing insider threats for their organization and found that 59% prioritize external threats over internal ones. However, the majority of incidents (59%) in EMEA over the last twelve months were caused by insiders. 

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Downplaying the threat

Drilling deeper into the reasons for downplaying insider threats, Imperva found that 39% of companies lack the necessary budget. Approximately the same percentage (38%) cited lack of internal expertise, while 29% said they didn’t see insiders as a “substantial threat”. 

A third (33%) said they didn’t have executive sponsorship, and were thus indifferent to insider threats, while 70% said they didn’t have an insider risk management strategy. More than half (58%) lack a dedicated insider threat team.

An insider threat may sound ominous, but often there is no little malice involved on the part of the employee.

Sometimes, employees take sensitive data with them when moving onto a new position, believing the information will help them in their new position. However, doing so exposes their previous employer to a potential data breach.

In other instances, workers act recklessly, taking away storage devices and other endpoints with sensitive data, without double-checking their contents. Others accidentally invite threat actors into the corporate network after falling for a phishing scam, leading to a malware infection.

Of all the major breaches that happened in the last five years, a quarter (24%) were caused by human error. 

“It is imperative that organizations add insider risk to their overall data protection strategy. An effective insider threat detection system needs to be diverse, combining several tools to not only monitor insider behavior, but also filter through the large number of alerts and eliminate false positives,” said Chris Waynforth, AVP Northern Europe at Imperva.

“Also, as protection of a companies’ intellectual property begins at the data layer, a comprehensive data protection plan must include a security tool that protects the data layer.”

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
security
The true cost of a security breach
Security padlock in circuit board, digital encryption concept
Rising cost of breaches forces organizations to rethink cybersecurity
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras