- Threats of initiates are now considered to be a greater risk than external attacks, the report finds
- Almost two -thirds of the organizations have faced violations related to the file in the past two years, average costs reaching 2.7 million dollars
- 27% use DLP tools to combat the risks of initiates, but layers in layers are still essential
The threats of initiates cybersecurity – whether malicious and unhappy employees, or simply negligent individuals – are a greater concern than they have ever been, said new research.
The OPSWAT – PONEMON State of File Security report, which interviewed 612 IT and security practitioners in the United States, found that almost half (45%) of respondents quoted the initiate data as the main threat to their security strategy.
This makes threats of initiates a greater problem than external attacks, which was also confirmed by different statistics – almost two thirds (61%) of respondents experienced a data violation or a security incident involving unauthorized access to sensitive or confidential data in files in the past two years.
Prevention of data loss at the rescue
For more than half of the respondents (54%), violations affected their net profit.
The average cost of incidents was $ 2.7 million in the past two years, two -thirds (66%) of respondents saying that the average cost of all incidents in the past two years was between $ 500,000 and more than $ 10 million.
The problem is only aggravated by limited visibility and control over how the files are accessible, shared and stored, the report said.
Many organizations have apparently struggling to monitor files effectively, leaving them exposed to unauthorized access. However, despite the severity of the threat, only 40% of organizations declared the ability to detect and respond to threats based on files in a day or a week.
Ponemon says that many organizations are now turning to data loss preventive technologies (DLP) to mitigate these risks.
The report indicates that more than a quarter (27%) of respondents have already deployed the DLP – mainly to treat threats of initiates. These tools can help monitor files, access policies and report suspicious behavior.
The report also stresses that DLP alone will not be enough and that companies need a complete file safety strategy, with a layer defense.
Via Infosecurity magazine