Mon. Nov 18th, 2019

Insider Threat Statistics Every Organization Should Know

Of the cyber threats currently plaguing organizations, insider threats is among the least talked about, which is sad because many of today’s most damaging security threats do not originate from malicious outsiders.

 

They originate from malicious insiders and negligent insiders.

 

And since September is Insider Threat awareness month, this month’s Tech Tip Tuesday’s will focus on insider threats.

 

This week, we compiled a list of insider threat statistics every organization should know.

 

Most Vulnerable Data

As we said in last week’s Tech Tip Tuesday, anyone with valid access to your network can be an insider threat. In fact, access to your data is one of the things all insider threats have in common.

 

Although data is vital to your organization’s core function, all data is not created equally.

What type(s) of data is most vulnerable to an insider threat?

  • Confidential business information (financial, customer data, employee data)
  • Account information
  • Sensitive personal information

 

According to Cybersecurity Insiders, 2018 Insider Threat report, confidential business information was most vulnerable to a cyber attack (57%), followed by privileged account information (52%), and sensitive personal information (49%).

 

IT Assets at risk

So, where are insider threat actors finding all of this valuable information? Databases, file servers, cloud applications, among other things.

 

Source: Cybersecurity Insiders

 

Enabling Risk Factors

Although the most common culprit of insider threats is accidental exposure by employees. A survey of cyber professionals revealed a few factors play a key role in increasing organizations chances of an insider attack:

 

  • Too many users with excessive access privileges (37%)
  • An increasing number of devices with access to sensitive information  (36%)
  • Technology is becoming more complex (35%)

Conclusion

As we said before, there is no one size fits all approach to eliminating insider threats. What there is, however, are methods and security tools to detect and analyze insider threats.

 

At Layer 7 Data Solutions we can help you identify who has access to your data, classify your sensitive data, alert your teams to potential threats, and help maintain a least privilege model. With our resources, you can gain visibility of the highest risk users and gather the intelligence needed to avoid insider threats.

 

Contact us today at Sales@layer7data.com or (718) 749-9421.