BreachExchange mailing list archives
Study highlights the ups and downs of infosec management
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Wed, 2 Oct 2013 01:06:00 -0600
http://www.csoonline.com/article/740269/study-highlights-the-ups-and-downs-of-infosec-management September 24, 2013 — A new study from Harris Interactive, sponsored by identity and access management firm Courion, offers some interesting insight into the risk profile of more than 2,000 adults. The study was commissioned by Courion to focus on risky behavior, but CSO found it interesting for a completely different matter. The results offer an unfiltered view into how people think. When it comes to adults who were asked if they know at least one co-worker who is, or has, accessed company information that they shouldn't have access to, or if they themselves are doing it, 74 percent of those who took part in the study disagreed with that notion. This is good news, as it shows that people for the most part can be trusted with access. The down side to that is that 26 percent of the same group knew someone accessing data that they shouldn't, or worse, they themselves were accessing the data. This is where many organizations struggle and stories of loss due to a trusted insider fall squarely into this group. Related to trusted access are two other questions — one detailing with job change, and the other outright theft. Account management has always been an issue that any security organization needs to deal with. Once an employee leaves the job, their access to the network and corporate access needs to be revoked. However, according to the study, 16 percent of the adults questioned reported that they were still able to use old usernames and passwords, to access their former employer's systems, applications, or customer accounts. Moreover, 15 percent of them admitted that if they knew they were about to be fired, they would take company information such as customer data, prices lists, or production plans with them. Obviously, the upside of those stats is the fact that the majority had no access after leaving, and would not take sensitive information if they knew the axe was falling. The picture painted here, again, is that people for the most part can be trusted, but there will always be an exception to the rule. This is why access controls and monitoring are important layers to any rounded network defense strategy. "It's worrisome that despite years of software development and awareness-building, many organizations still lack control and insight into the growing access risk within their own walls, said Chris Sullivan, vice president, advanced intelligence solutions at Courion in a statement on the data Risk from within is a topic that CSO covers extensively, the most recent example being a study last month from TNS Global. According to that study, 30 percent of those surveyed admitted they would open an email, even if they were aware that it contained a virus or was otherwise suspicious. According to the Harris Interactive study, when asked if they've clicked on an email at work that was suspected of being a Phishing email or otherwise fraudulent, 21 percent of the respondents admitted to doing so. Further, the same group also said they didn't inform IT of their actions. "These are otherwise intelligent people who, if informed about the potential consequences of their actions, would do the right thing," said Sullivan. "Any employee may succumb to natural curiosity. Before curiosity kills the cat, organizations need to get their arms around this behavior. They need to educate their employees and use systems that eliminate risky activities."
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: # OWASP http://www.appsecusa.org # Builders, Breakers and Defenders # Time Square, NYC 20-21 Nov o()xxxx[{::::::::::::::::::::::::::::::::::::::::> Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security offers security intelligence, risk management services and customized security solutions. The YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.
Current thread:
- Study highlights the ups and downs of infosec management Audrey McNeil (Oct 11)