Businesses 'risk GDPR breaches' as they underestimate threat from insiders
Businesses overestimate the danger of attacks from outside threat actors compared to the real threat which comes from the insider, raising the prospect of GDPR-related breaches, according to a survey from Netwrix.
It found a disconnect between the perception of risk compared to where the real risk was coming from, as respondents rated the threat from outside attacks as being around 50 percent of their organisational risk compared to the reality which shows that 73 percent of attacks originate from insiders.
Earlier this year, the government introduced the new Data Protection Act that not only hiked the maximum fines for erring organisations from £500,000 to £18 million or 4 percent of a firm's annual turnover, but also introduced several stringent regulations that organisations had to comply with to escape fines or loss of reputation.
Some of these requirements included the duty of organisations to obtain clear affirmative consent for the collection, storage, and processing of customer data, to appoint qualified data protection officers, to conduct data privacy impact assessments, and to notify authorities and customers about breach incidents within 72 hours of discovering such breaches.
Considering the level of fines involved that could threaten the very existence of a business, one would expect that organisations in the UK have taken firm and timely action to reduce their exposure not only to cyber-threats but also to regulatory action in the aftermath of successful cyber-attacks.
However, a survey carried out by Netwrix Corporation to assess how UK-based organisations are addressing major IT risks such as physical damage, intellectual property theft, data loss, data breach, system disruption and compliance penalties tells an entirely different story.
The survey, results of which have been compiled by Netwrix Corporation in its 2018 IT Risks Report, touched upon how organisations categorised their principal IT threats, how frequently they carried out risk assessments, how much visibility they had over stored data, whether they were confident of their incident detection capabilities, and whether they had incident response plans in place.
According to the survey, 73 percent, or nearly three in every four security incidents are caused by insiders such as business users, mid-level managers, departing employees, and IT team members, yet over 50 percent of employees consider external hackers as the most dangerous threat actors in terms of data breach, thereby signifying a major gap in perceived threats versus the real ones.
Many cyber-security experts would argue that a mix of efficient privilege access management, two-factor encryption, multi-stage authentication, and machine learning technologies should enable organisations to detect or prevent data breaches. Yet, the survey revealed that 35 percent of organisations update access rights in accordance with least privilege principle only once a year, 85 percent of them do not discard stale and unnecessary data, and security controls are rarely reviewed as required by best practices.
At the same time, only 21 percent of UK-based organisations carry out IT risk assessments regularly even though 80 percent of them have carried out the exercise only once, one in five organisations do not know where sensitive data is located and how employees deal with it, and only 35 percent of those surveyed said they have incident response plans in place and provide training to employees.
When asked if a majority of UK-based organisations are carrying out risk assessments, training employees in cyber-security, or strengthening their security controls just because they are required to do so, Tony Richards, group CISO at Falanx Group told SC Magazine UK that if the survey results are to be believed, then it demonstrates that a high number of organisations are not compliant with the DPA 2018 and the GDPR.
He said it is "worrying that less than a quarter of organisations are reviewing those assessments regularly".
"If over 60 percent of organisations don’t have defined incident response plans, it’s unlikely that they have implemented Personal Data Breach reporting processes and will fail to meet the 72-hour breach reporting requirements," he said.
According to Matt-Middleton Leal, EMEA general manager at Netwrix, even though GDPR has become a catalyst for UK companies to revise their security strategies, the majority of them still lack the support of their leadership teams to invest in building a holistic approach to cyber-security.
Source scmagazineuk
Industry: Cyber Security News
Latest Jobs
-
- Senior Data Privacy Consultant. Client Facing | London
- London
- N/A
-
Senior Data Privacy Consultant. Client Facing | London Senior Data Privacy Consultant needed for a key client facing opportunity. Must be willing to undergo SC Security Clearance. Hybrid role- onsite with customer / office 2-3 days a week. London Key Responsibilities: Lead and support client facing data privacy projects. Assess compliance, define and deliver strategic projects / implement privacy solutions. Manage project teams and develop business opportunities. Required Experience: Experience in data protection and privacy standards. Background in consulting. Skills and Qualifications: Business consulting experience IAPP Privacy Manager / Privacy Technologist Location Greater London UK based role. Not able to provide VISA sponsorship.
-
- Security Analyst - Internal role. London commutable. Permanent
- London
- N/A
-
Security Analyst - Internal role. London commutable opportunity. Operational Security - Investigate, escalate and proactively work to ensure household name remains protected. Project Security - Coordinate, log change requests with project delivery teams to meet security requirements Policy / compliance - work with team to aid in uplifting these as and where needed This role is role to investigate, escalate and proactively work to protect a globally recognised brand. You must have current hands on operational analytical security experience with Microsoft technology stack Someone with a SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- SailPoint File Access Manager Consultant/ Architect
- N/A
- discussed on applications
-
SailPoint File Access Manager (SailPoint FAM) Consultant/ Architect is required for an up coming projects, Ideally looking for someone with experience in Designing and deploying SailPoint FAM , this is a new Deployment, you will work with customer in the initial workshop phase, to understand requirements and to get the initial design, you will then be responsible for deploying the solution. This is a home based role, with some onsite visits required during the length of the project. We are looking for someone who has previous experience in Deploying SailPoint FAM (ideally done design work) Need to have experience with SharePoint and ideally Azure and Share file