Risky Business: Most Companies Fault Human Error for Data Breaches
New Research by Ponemon Institute and Trend Micro
OTTAWA, March 5, 2012 /CNW/ - Employee carelessness or malevolence is often the root cause of many data breaches, according to a new report - "The Human Factor in Data Protection" - from the Ponemon Institute and sponsored by Trend Micro Inc. (TYO: 4704;TSE: 4704), a global cloud security leader. Over 78 percent of respondents blame employee behaviors, both intentional and accidental, for at least one data breach within their organizations over the past two years. Click here for the full report.
The top three root causes of these data breaches are:
- Loss of a laptop or other mobile data-bearing devices (35 percent),
- Third party mishaps or flubs1 (32 percent)
- System glitches (29 percent).
While human error may be viewed as the root cause, nearly 70 percent of the respondents agreed or strongly agreed that their organization's current security activities are not enough to stop a targeted attack or hacker, according to the Study authors who recently surveyed 709 experienced IT and IT security practitioners based in the United States.
The Report reveals that even when employees make unintentional mistakes, most of these breaches are only discovered accidentally, according to 56 percent of respondents. Only 19 percent of respondents say that employees self-reported the data breach, making it difficult to promptly resolve the breach. Thirty-seven percent say that an audit or assessment revealed the incident and 36 percent say that data protection technologies revealed the breach.
Employees of small and medium sized businesses (SMBs) reported to be more likely to engage in "risky" behavior: 58 percent of them will or have already opened attachments or web-links in spam, versus 39 percent from enterprises; 77 percent will or have already left their computer unattended, as did 62 percent from their enterprise counterparts. The survey also found that more than half (55 percent) of SMB employees were likely to visit off-limit websites, compared to 43 percent of enterprise employees.
"Our conclusion is that most threats posed by employees and those within companies are becoming more prevalent because of the mobility of the workforce, proliferation of mobile data-bearing devices, consumerization of IT, and the use of social media in the workplace. We saw that most surveyed believe their companies are not doing enough to ensure a more effective security infrastructure against hackers and targeted attacks. Combined with data-centric security technology, education and awareness among employees are essential," said Dr. Larry Ponemon, chairman and founder of Ponemon Institute.
"We help companies and their employees approach security with a new mindset, putting the focus on "data-centric" security that integrates threat and data protection capabilities. This approach means that companies know who is accessing what data, when, where and how," says Ian Gordon, Trend Micro Canada's Director of Marketing and Channel.
According to the findings of the study, the following are the top 10 "risky" practices employees routinely engage in:
- Connecting computers to the Internet through an unsecured wireless network.
- Not deleting information on their computer when no longer necessary.
- Sharing passwords with others.
- Reusing the same password and username on different websites.
- Using generic USB drives not encrypted or safeguarded by other means.
- Leaving computers unattended when outside the workplace.
- Losing a USB drive and not immediately notifying their IT department
- Working on a laptop when traveling and not using a privacy screen.
- Carrying unnecessary sensitive information on a laptop when traveling.
- Using personally owned mobile devices that connect to their organization's network.
How safe is your business? Trend Micro's Data Risk Calculator allows you to quickly identify the risk level for your data and how your risk compares to other similar organizations. To use the free online data risk calculator, please visit: http://www.trendmicro.com/datariskcalculator |
Recommendations for business and their employees to help minimize data risks:
- Create awareness among employees about the need to spend time and effort on data protection activities.
- Ensure data protection policies address areas where an organization is most vulnerable to a data breach.
- Investigate cost effective and efficient governance and technology solutions such as email based data loss prevention, email encryption and secure file sharing.
- Make sure those who are given privileged user status are knowledgeable about the risks.
- Require immediate notification if a mobile device containing sensitive and confidential information is lost or stolen.
- Create responsible policies for the use of social media in the workplace.
Supporting assets:
For the full report:
For the executive summary, please visit:
Methodology
The study surveyed 709 IT and IT security practitioners (hereafter referred to as IT practitioners) based in the United States. On average, respondents have more than 10 years of relevant experience. Only IT practitioners who have some level of responsibility for data protection in the organization participated in this study. Forty-five percent of respondents are at the manager level or higher in the organization. Seventy-eight percent are in organizations with a headcount between 100 and 5,000. Ponemon also examined differences with respect to the human factor risk between organizations that are larger (those with a headcount of more than 100) and smaller organizations (referred to as a small-to-medium sized business or SMB).
About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.
About the Ponemon Institute:
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in a variety of industries.
________________________
1 Defined by Ponemon as when a third party vendor has another company's data that is stolen or lost by the vendor, not the original entity, and cause of data loss is unknown.
Media Contact: Claire M. Tallarico 416 616 9940
Share this article