Theft of access data: every 2nd company affected

Theft of access data: every 2nd company affected

Share post

Over half of the companies are affected by the theft of privileged access data and insider threats. ThycoticCentrify study: 77 percent use the zero trust approach in response to increased attacks on critical systems and data.

Over half of companies struggled with privileged login theft (53 percent) and insider threats (52 percent) in the past twelve months. This is shown by a new study by ThycoticCentrify, a leading provider of cloud identity security solutions. In 85 percent of the cases in which cybercriminals stole privileged credentials, they were able to access critical systems and / or data. In addition, 66 percent of insider threats resulted in the abuse of administrator privileges to illegally access critical systems and / or data.

Dangerous insider threats

The study commissioned by ThycoticCentrify in collaboration with CensusWide surveyed 2021 IT decision-makers in the USA in May 150 about the most common risks associated with privileged access and trends in the introduction of Zero Trust. In addition to external attacks and insider threats, almost every second company (48 percent) suffered a data leak in the last year because an employee or contractor was given too many access rights. Given such attack patterns, it is not surprising that companies were most likely to see their IT administrators targeted by cybercriminals (65 percent), followed by engineers and developers (21 percent) and the C-suite (19 percent).

77 percent of the companies use the zero trust approach

The survey also found that 77 percent currently have a zero trust approach in their cybersecurity strategy. 42 percent named the reduction of cyber threats as the main reason, followed by better compliance (30 percent), curbing the abuse of privileged access rights and the inspection and logging of data traffic or access requests (14 percent each).

The most common barriers to adopting Zero Trust include complicated or inadequate security solutions (57 percent), fear of a compromised user experience (43 percent), budget (38 percent), and human resources (30 percent). A large majority of respondents (83 percent) have a privileged access management (PAM) tool integrated into their security infrastructure. 89 percent of these PAM services support a zero trust approach to verify the identity of privileged users.

More security: Privileged Access Management (PAM) tool

“IT administrators hold the keys to the most sensitive and critical systems in their hands. Both internal and external attackers take advantage of this, ”says Özkan Topal, Sales Director at ThycoticCentrify. “Unauthorized access to these systems can lead to far-reaching security incidents. To counter these risks, the introduction of zero trust principles is a very good start. Since privileged identities play such a striking role in most data leaks, it makes sense to start the path to a comprehensive zero trust approach with a privileged access management solution based on a least privilege model of access control . " The full results of the survey are available online.

More at Centrify.com

 


About ThycoticCentrify

ThycoticCentrify is a leading provider of cloud identity security solutions that enable digital transformation on a large scale. ThycoticCentrify's industry-leading Privileged Access Management (PAM) solutions reduce risk, complexity and cost while protecting enterprise data, devices and code in cloud, on-premises and hybrid environments. More than 14.000 leading companies around the world, including more than half of the Fortune 100, trust ThycoticCentrify. Customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Whether human or machine, in the cloud or on-premises - with ThycoticCentrify, privileged access is secure.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more