Who poses the biggest threat to IT security? People. Several studies have found that people are most likely to put organizations at risk for a cyber attack. Find out more -- and how companies can combat risky behavior...
While cyberattacks anywhere are always a concern, the true weakness in cloud, endpoint and network security is people. The Cloud Security Survey from Netwrix found that 61 percent of respondents believe their own employees pose more risk to data security in the cloud than anyone else.
The second annual survey polled 600 IT professionals from technology, government, healthcare, finance, manufacturing and other industries about cloud and data security.
According to the findings, 70% of respondents believe security and privacy of data and systems in the cloud remains a concern. The top three cloud security worries include unauthorized access, malware, and denial of service (DoS) attacks.
Ninety-five percent of respondents also consider visibility into user activities in the cloud to be an important element in cloud providers’ security guarantees. However, it's unrealistic for companies to rely on others to secure corporate data.
The Institute of Information Security Professionals (IISP) says there are several ways people are putting organizations at cyber risk:
We’ve talked about the Three Faces of the Insider Threat, which are the same across networks, endpoints and the cloud, and how understanding this behavior can help mitigate those threats. But it's also about knowing what the data is, where it is, and how to protect it.
While the majority of cloud applications lack enterprise-grade security and cause fragmentation that increases the risk of cyberattack, the real problem is visibility. That's where Absolute comes into play.
We recently introduced the first Security Posture Dashboard to provide an at-a-glance measure of the health and compliance of endpoint devices and applications. Part of Absolute’s self-healing Data and Device Security solution, the Dashboard gives companies an easier, intuitive way to see and assess data-at-risk.
Join us on Twitter and LinkedIn for more insights and to continue the conversation. Questions? Comments? Topic suggestions? Email us at [email protected].