Businesses 'risk GDPR breaches' as they underestimate threat from insiders
Businesses overestimate the danger of attacks from outside threat actors compared to the real threat which comes from the insider, raising the prospect of GDPR-related breaches, according to a survey from Netwrix.
It found a disconnect between the perception of risk compared to where the real risk was coming from, as respondents rated the threat from outside attacks as being around 50 percent of their organisational risk compared to the reality which shows that 73 percent of attacks originate from insiders.
Earlier this year, the government introduced the new Data Protection Act that not only hiked the maximum fines for erring organisations from £500,000 to £18 million or 4 percent of a firm's annual turnover, but also introduced several stringent regulations that organisations had to comply with to escape fines or loss of reputation.
Some of these requirements included the duty of organisations to obtain clear affirmative consent for the collection, storage, and processing of customer data, to appoint qualified data protection officers, to conduct data privacy impact assessments, and to notify authorities and customers about breach incidents within 72 hours of discovering such breaches.
Considering the level of fines involved that could threaten the very existence of a business, one would expect that organisations in the UK have taken firm and timely action to reduce their exposure not only to cyber-threats but also to regulatory action in the aftermath of successful cyber-attacks.
However, a survey carried out by Netwrix Corporation to assess how UK-based organisations are addressing major IT risks such as physical damage, intellectual property theft, data loss, data breach, system disruption and compliance penalties tells an entirely different story.
The survey, results of which have been compiled by Netwrix Corporation in its 2018 IT Risks Report, touched upon how organisations categorised their principal IT threats, how frequently they carried out risk assessments, how much visibility they had over stored data, whether they were confident of their incident detection capabilities, and whether they had incident response plans in place.
According to the survey, 73 percent, or nearly three in every four security incidents are caused by insiders such as business users, mid-level managers, departing employees, and IT team members, yet over 50 percent of employees consider external hackers as the most dangerous threat actors in terms of data breach, thereby signifying a major gap in perceived threats versus the real ones.
Many cyber-security experts would argue that a mix of efficient privilege access management, two-factor encryption, multi-stage authentication, and machine learning technologies should enable organisations to detect or prevent data breaches. Yet, the survey revealed that 35 percent of organisations update access rights in accordance with least privilege principle only once a year, 85 percent of them do not discard stale and unnecessary data, and security controls are rarely reviewed as required by best practices.
At the same time, only 21 percent of UK-based organisations carry out IT risk assessments regularly even though 80 percent of them have carried out the exercise only once, one in five organisations do not know where sensitive data is located and how employees deal with it, and only 35 percent of those surveyed said they have incident response plans in place and provide training to employees.
When asked if a majority of UK-based organisations are carrying out risk assessments, training employees in cyber-security, or strengthening their security controls just because they are required to do so, Tony Richards, group CISO at Falanx Group told SC Magazine UK that if the survey results are to be believed, then it demonstrates that a high number of organisations are not compliant with the DPA 2018 and the GDPR.
He said it is "worrying that less than a quarter of organisations are reviewing those assessments regularly".
"If over 60 percent of organisations don’t have defined incident response plans, it’s unlikely that they have implemented Personal Data Breach reporting processes and will fail to meet the 72-hour breach reporting requirements," he said.
According to Matt-Middleton Leal, EMEA general manager at Netwrix, even though GDPR has become a catalyst for UK companies to revise their security strategies, the majority of them still lack the support of their leadership teams to invest in building a holistic approach to cyber-security.
Industry: Cyber Security News
- Healthcare Business Development Manager
- Up to £60,000 Base + UNCAPPED Earnings
Healthcare Business Development Manager We are currently working with a multi-vendor IT solutions provider who are looking for a Business Development Manager who will be responsible for selling into the Healthcare Industry in a new business focussed position. The Healthcare Business Development Manager will have Current/Recent experience working for an IT managed services business/solutions provider. Experience delivering £150,000+ GP a year Current/Recent experience winning new healthcare accounts (all accounts won are kept) Flexible working is provided and also uncapped earnings. Apply for more information or call Peter Georgiou on 02086634030. Unfortunately, our client are unable to provide sponsorship so candidates must be UK based (commutable to London). Ref PG7577
- Cyber Incident Response specialist
- Up to £75,000 Base
Cyber Incident Response specialist is needed to join a global consultancy whose cyber business unit are continuing to their investment in the growth of their team. The Cyber Incident Response specialist role is client-facing that will join an award-winning team that deliver varied, interesting and often challenging work to a wide range of prestigious clients. The Cyber Senior Incident Response MUST have current experience taking a client through the complete IR / triage process and have a blend of both technical and commercial (identifying and developing new business opportunities within a client) Proactive Incident response, forensics and Ediscovery experience is a MUST. An individual must be London commutable and happy to travel, often internationally. Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within an cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) Any of the following are very desirable also CREST Certified Network Intrusion Analyst (CCNIA) CREST Certified Host Intrusion Analyst (CCHIA) CREST Certified Malware Reverse Engineer (CCMRE) CREST Practitioner Intrusion Analyst (CPIA) Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 or 02086634030 or email firstname.lastname@example.org Unfortunately, our client are unable to provide sponsorship for this opportunity. Candidates must be UK based. Ref: CH7578
- Sales Engineer (Telecoms, Ethernet, SDH, MPLS, IP)
- Up to €75,000 + Commission
Sales Engineer / Presales Consultant is needed for this Global Tier 1 carrier. You will be working with Enterprise customers helping to design solutions that solve your their business needs. You will be responsible for working alongside sales providing presales technical consultancy around my client's solutions base. You will be responsible for providing support for new business opportunities in terms of responding to RFIs & RFPs, understanding customer network requirements, high-level network architecture & design (including supplier selection on a global basis) and technical handover to network implementation teams. This is a great opportunity to join a global player who are growing their France based teams. You will require a successful track record in the telecommunications arena ideally from a global tier 1 ISP or network provider, with a demonstrable track record in designing complex enterprise solutions. A Sales Engineer needs to be technically astute and has had experience in the design, presentation, and implementation of Wide Area Networks (WAN). They need to understand a range of Layer 1, 2, and 3 technologies (Ethernet, SDH, MPLS, IP, etc) and build a solution based on the best technology to meet a customer’s requirements. In addition, they should have an understanding and experience in supplementary telecommunications services such as VoIP, Video Conferencing, Cisco and Riverbed hardware, and Security If you have any questions about this role, give us a call on 0044208 663 4030 or contact/send your CV to email@example.com Ref: RA7275
- Partner Manager (Network and UCC Services)
- Up to €100,000 plus €60,000 OTE, car allowance and benefits
We are looking for an experienced Partner Manager / Channel Manager to work for a global service provider to sell their Global SIP and Network Services to Enterprises and corporates through the partner market. This is a hunter role, and looking for an experienced salesperson who has knowledge of selling to and through the SI, Cisco and Microsoft Resellers. You will be responsible for Own and formulate a Sales and execution plan to get to quarterly targets Generate Leads from the partners Work with the Partner salesperson to help close deals. Acquire new partners and Deliver Quarterly numbers through the partners Work with Partner Marketing to create and run joint Partner plans/events to drive sales You will need to have experience in selling at least one of these services, global SIP, UCC and SD-WAN into and through the channel of, European Sis, Cisco or Microsoft resellers. Hunters who can identify key decision-makers in the targeted accounts Should be credible for partner to trust the person with leads and opportunities Drive to work through leads to closure along with the partner salesperson Ref: RA7277