High-growth companies take on high cyber risks

High-growth companies take on high cyber risks

Share post

Despite their enormous financial success, high-growth companies tend to be careless when it comes to IT security. A recent Beyond Identity study of more than 1.100 workers shows how vulnerable high-growth companies are to cyber risk.

According to the survey, only 62 percent of respondents believe their thriving employers are proactive about online safety. At the same time, just over half (55%) of employees confirm that they take even the most basic precautions, such as B. the restriction of administrative network rights.

Poor password hygiene in companies

Looking specifically at password tactics employed by employers, an alarming picture emerges: while password compromise is the most common way for hackers to gain insider access, high-growth companies suffer from poorer password hygiene ordered than in normal growth companies. For example, passwords are stored less securely.

As a result of this lax approach to security, high-growth companies regularly face security breaches. More than a third of those surveyed (35%) state that their company has already been exposed to between three and five cyber attacks, and 20 percent have been affected even more frequently. As their name suggests, high-growth companies put a lot of capital at risk, which in turn makes them a prime target for attackers. However, they seem to be better able to limit the damage (87.000 euros) than standard companies, whose losses averaged more than 110.000 euros.

Better measures only after security breach

Another plus for high-growth organizations is that many have tightened the reins after a security breach: 70 percent immediately started educating their employees about cybersecurity and 60 percent started securing their data. However, less than half of standard and high-growth companies invested in cybersecurity insurance or installed dedicated cybersecurity software after an incident. While it's encouraging that these companies have started implementing security measures, the survey showed that they are inadequately protecting their employees and critical data. The complete results of the study as well as valuable tips can also be read online.

More at BeyondIdentity.com

 


About Beyond Identity

Beyond Identity provides the secure authentication platform, breaking down the barriers between cybersecurity, identity and device management, and fundamentally changing the way users log in - without passwords and with a frictionless, multi-step login process. Beyond password-free, the company offers zero-trust access for securing hybrid work environments where tight control over which users and which devices access critical cloud resources is essential.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more