Sydney/Auckland, September 22, 2016 – While 82 percent of respondents believe the IT security industry is making progress against cyber attacks, those gains are undercut by egregious security practices in critical areas such as privileged account security, third-party vendor access and cloud, according to results from a new global survey commissioned and released by CyberArk: http://www.cyberark.com/ (NASDAQ: CYBR).
The 10th annual CyberArk Global Advanced threat Landscape Survey 2016 (http://www.cyberark.com/resource/2016-global-advanced-threat-landscape-survey/) themed “Cyber Security: Past, Present & Future,” examines whether global enterprises are learning and applying lessons from high-profile cyber attacks, and how security priorities and business decision-making are being influenced.
Cyber Lip Service? Bad Security Habits Persist, Despite Rising Awareness
Headline-making cyber attacks have driven significant increases in cyber security awareness. However, the failure to turn increased awareness into the enforcement of security best practices undermines progress for organisations’ cyber security efforts.
- Seventy-nine (79) percent state their organisation has learned lessons from major cyber attacks and has taken appropriate action to improve security.
o Sixty-seven (67) percent now believe their CEO/board of directors provide sound cyber security leadership (up from 57 percent in 2015).
o The top actions taken because of this awareness are deployment of malware detection (25 percent), endpoint security (24 percent) and security analytics (16 percent).
- Fifty-five (55) percent of respondents state their organisation has changed or evolved processes for managing privileged accounts.
o Despite this, 40 percent of organisations still store privileged and admin passwords in a Word document or spreadsheet, while 28 percent use a shared server or USB stick.
- Nearly half of organisations (49 percent) allow third-party vendors (such as supply chain and IT management firms) remote access to their internal networks.
o While the majority of respondents secure and monitor that access, the public sector has the least third-party vendor access controls in place compared to other industries, with 21 percent not securing and 33 percent not monitoring that activity.
A Cyber State-of-Mind: Striking a Balance Between Fear and Overconfidence
Organisations are increasingly adopting a post-breach mindset, preparing to deal with ongoing cyber attacks and activity in the case of a breach. This preparedness is leading to positive steps in post-breach planning, but concerns exist about how overconfidence may affect the ability to protect against cyber attacks.
- Three out of four IT decision makers now believe they can prevent attackers from breaking into their internal network – up from 44 percent in 2015.
o Despite this, 36 percent believe a cyber attacker is currently on their network, or has been in the last 12 months.
o Forty-six (46) percent believe their organisation was a victim of a ransomware: http://www.cyberark.com/blog/new-cyberark-labs-research-analyzing-ransomware-potential-mitigation-strategies/ attack in the past two years.
- Eighty-two (82) percent of respondents believe the security industry in general is making progress against cyber attacks.
o Seventeen (17) percent believe the industry is falling further behind.
- Nearly every organisation (95 percent) has a cybersecurity emergency response plan.
o This preparedness is undermined by a lack of communication and testing – only 45 percent communicate and regularly test their plan with all IT staff.
- Sixty-eight (68) percent of organisations cite losing customer data as one of their biggest concerns following a cyber attack.
o Sixty (60) percent of those who use the cloud store customer data in it.
o Fifty-seven (57) percent who store information in the cloud are not completely confident in their cloud provider’s ability to protect their data.
- When identifying the most difficult stage of a cyber attack to mitigate, malware installation ranked first (41 percent), followed by privileged account: http://www.cyberark.com/products/privileged-account-security-solution/viewfinity/ takeover (25 percent).
On the Radar: Future Risks Emerge
As cyber attacks continue on trusted institutions such as government, utilities and financial systems, respondents identify what types of cyber attacks or tactics are most concerning. Respondents also share which cyber attack scenarios they think represent the most immediate and potentially catastrophic threat in general.
- Respondents list the following types of cyber attacks or tactics as the top-ranked concern in the next 12 months: Distributed denial-of-service (DDoS) attacks (19 percent), phishing (14 percent), ransomware (13 percent), privileged account exploitation (12 percent) and perimeter breaches (12 percent).
- Attacks on financial systems, including disruption of global markets (58 percent) is the most potentially catastrophic threat perceived by respondents, followed by attacks causing massive utilities damage (55 percent) and those impacting civil services such as healthcare and hospital services (51 percent).
The Impact of a Breach on Customer Data and Corporate Accountability
The survey found a varied global picture in terms of preparedness for increased regulatory oversight and the impact on cyber security programs and accountability.
- While 70 percent of global respondents agree that the threat of legal action and fines influence the level of executive/board involvement in security-related decisions, 22 percent of the respondents do not incorporate compliance fines or legal fees (19 percent) into the cost of a breach.
- Nearly seven in ten (69 percent) respondents state that, in response to a breach or cyber attack, stopping the breach/removing the attackers is among their top priorities, followed by detecting the source of the breach (53 percent).
o Far fewer respondents prioritise notifying the CEO/board (26 percent), entire staff/workforce (25 percent) or customers (18 percent).
“The findings of this year’s Global Advanced Threat Landscape Survey demonstrate that cyber security awareness doesn’t always equate to being secure. Organisations undermine their own efforts by failing to enforce well-known security best practices around potential vulnerabilities associated with privileged accounts, third-party vendor access and data stored in the cloud,” said John Worrall, CMO, CyberArk. “There’s a fine line between preparedness and overconfidence. The majority of cyber attacks are a result of poor security hygiene – organisations can’t lose sight of the broader security picture while trying to secure against the threat du jour.”
Download the Report
To download the full CyberArk Global Advanced Threat Landscape Survey 2016, visit: http://www.cyberark.com/ThreatSurvey2016.
About the Research
CyberArk commissioned independent research firm Vanson Bourne to conduct surveys with 750 IT and IT security decision makers from around the world, including C-level executives, directors and department heads among enterprise organisations. Respondents represent a range of public and private organisations across multiple vertical industries from the United States, Europe (France, Germany, United Kingdom), Israel and Asia Pacific (Australia, New Zealand, Singapore).
CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 45 percent of the Fortune 100 – to protect their highest value information assets, infrastructure and applications. A global company, CyberArk is headquartered in Petach Tikvah, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout EMEA and Asia Pacific and Japan. To learn more about CyberArk, visit: www.cyberark.com, read the company blog: http://www.cyberark.com/blog/, follow on Twitter @CyberArk or Facebook at: https://www.facebook.com/CyberArk.
# # #
Copyright © 2016 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.
Showreel | IDG Security Day conference, 21st June
Tools of the Trade: A Live Hacking Demonstration - Ty Miller, Director, Threat Intelligence | IDG Security Day
Publisher's Panel - Using AI for next-generation Cyber Security | IDG Security Day
How the Government's Innovation Strategy Focus will Support the Growth of Cyber in Australia - Craig Davies, CEO, Australian Cyber Security Growth Network | IDG Security Day
Social Engineering & User Awareness Initiatives - Stephen Kraemer, CISO, Ports of Auckland | IDG Security Day