Bromium, Inc., the pioneer and leader in virtualization-based
enterprise security that stops advanced malware attacks, today released
new research conducted at the RSA Conference (RSAC) 2017 that found
security professionals admit to knowingly circumventing security
protocols and hiding discovered breaches. The survey findings were so
surprising that Bromium surveyed a subsequent group of security
professionals in the U.S. and U.K. and the results were consistent.
Here's what the survey found:
- On
average, 10 percent of security professionals admitted to paying a
ransom or hiding a breach without alerting their team (5 percent at RSA,
15 percent in extended study). For context, there were 638 million ransomware attacks in 2016, suggesting that tens of millions of these attacks are potentially not being disclosed.
- On
average, 35 percent of security professionals admitted to going around,
turning off or bypassing their corporate security settings (38 percent
at RSA, 32 percent in extended study of U.S. and U.K. security
professionals).
"While we expect employees to find
workarounds to corporate security, we don't expect it from the very
people overseeing the operation," said Simon Crosby, co-founder and CTO
of Bromium. "Security professionals go to great lengths to protect their
companies, but to learn that their decisions don't protect the business
is frankly rather shocking. To find from their own admission that
security pros have actually paid ransoms or hidden breaches speaks to
the human-factor in cyber security. It's one reason we pursued
virtualization-based security: it takes the burden off the end-user and
ensures IT and security teams protect their business assets and data."
When
it comes to cyber security, there are really two ways to make it
happen: top down with typically strict limits on end-user behavior or,
distributed control with more end-user involvement. In the first case,
employees are limited in what they can do which can hinder business
innovation. In the latter case, employees can choose to turn off
security and put the business at tremendous risk. Either way, it's a
lose-lose situation when considered through the enterprise security
lens.
"With application isolation and hardware-enforced
containment, I don't have to worry about what people click on. They are
free to click on anything because applications, files and web browsing
sessions are isolated and therefore protected. And when they're done
with the task, if they were exposed to malware or ransomware, it goes
away and they go about their day," explains Paul Hershberger, Director,
IT Global Security and Compliance, Risk and Compliance at The Mosaic
Company.
View the infographic about the study and find out more about Bromium Secure Platform.