Virtualization Technology News and Information
Article
RSS
ThycoticCentrify Research Shows More than Half of U.S. Companies Affected by Cyberattacks to Critical Systems and Data in Past Year

ThycoticCentrify announced new research that reveals more than half of organizations have been grappling with the theft of legitimate, privileged credentials (53%) and insider threat attacks (52%) in the last 12 months. In 85% of the privileged credential theft instances, cybercriminals were able to access critical systems and/or data. In addition, two-thirds (66%) of insider threats led to abuse of administrative privileges to illegitimately access critical systems and/or data.

The research, commissioned by ThycoticCentrify with Censuswide, surveyed 150 IT decision makers across the U.S. on the most common privileged access risks and Zero Trust adoption trends. In addition to external and malicious insider threat attacks, the study found that nearly half (48%) of organizations experienced a data breach as a result of giving an employee or contractor too much access in the last year.

Based on these compromise patterns, it is not surprising that 65% of respondent companies saw their IT administrators targeted most frequently by cybercriminals, followed by engineers and developers (21%) and the C-suite (19%).

"IT administrators hold the keys to the most sensitive and mission-critical parts of the kingdom, and both internal and external attackers are taking full advantage," said David McNeely, chief technology officer at ThycoticCentrify. "Abusing access to these systems can lead to full-scale breaches that grab headlines and impact trust in the organization. While there is no single solution that can eliminate every one of these risk factors, adopting Zero Trust principles is an excellent start."

Zero Trust mandates a "never trust, always verify, enforce least privilege" approach to cybersecurity, whether the threat is coming from inside or outside the network. Promisingly, nearly all respondents are somewhat familiar (33%) or very familiar (62%) with the term, especially as it relates to identity and access management (IAM).

The survey found an impressive 77% currently utilize a Zero Trust approach in their cybersecurity strategy, possibly attributed to the frequent attacks on IT. In fact, 42% listed reducing cyberthreats as the top motivator for adoption, followed by better compliance (30%), reducing privileged access abuse, and inspecting and logging traffic/access requests (both 14%). Common barriers for adoption include complicated or inadequate security solutions (57%), fear of disrupting user experience (43%), budget (38%), and staffing resources (30%).

"There are many on-ramps to Zero Trust. But with privileged identities playing such a key role in most data breaches, it makes sense to begin that journey with a modern PAM solution built around a least privilege model of access control," said Tony Goulding, cybersecurity evangelist at ThycoticCentrify.

A large majority of respondents (83%) have incorporated a privileged access management (PAM) tool into their security infrastructure, and 89% of those PAM services support a Zero Trust approach to verify privileged users.

Complete results of the survey are available at https://charts.censuswide.com/CW7930/CW7930_VIbox.html

Published Monday, May 24, 2021 2:00 PM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<May 2021>
SuMoTuWeThFrSa
2526272829301
2345678
9101112131415
16171819202122
23242526272829
303112345