Breaches impact business' security strategies

Security breaches impact business' security strategies, according to CyberArk's 8th Annual Global Advanced Threat Landscape survey.

37 per cent of respondents said that the NSA/Edward Snowden breach had the biggest impact on their business' security strategy

31 per cent of respondents cited the retail/PoS attacks and 19 per cent cited government-sponsored espionage to have the biggest impact.

44 per cent find it difficult to detect, respond to and remediate attacks that reach the privileged account takeover stage.

The survey also shows that cyber-attackers are increasingly targeting third-parties or partners of businesses to steal and exploit their privileged access to the target company's network.

Remote access of networks

60 per cent of businesses allow third-party vendors to remote access their internal networks.

58 per cent of organisations are not confident that third-party vendors are securing and monitoring privileged access to their network.

52 per cent of respondents believe that a cyber-attacker is currently on their network, or has been in the past year.

30 per cent stated Bring Your Own Device (BYOD), 26 per cent cloud computing and 21 per cent stated regulatory compliance as the most impactful in terms of shaping and changing security strategies.

31 per cent of businesses have already deployed security analytics in some form, 33 per cent had no plans and 23 per cent were planning on deploying security analytics in the next 12 months.

"This year's survey results demonstrate that whether it's an insider like Edward Snowden, or an outside-based attack like the retail/PoS breaches, attackers require the exploitation of insider credentials to successfully execute their attacks," said Adam Bosnian, executive vice president, CyberArk.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags CyberArk

More about AdvancedNSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Anuradha Shukla

Latest Videos

More videos

Blog Posts