Despite a sharp rise in data breaches and increased media awareness on the subject, the third annual Cyber-Ark survey reveals that 35 percent of IT workers now admit to accessing corporate information without authorisation, while 74 percent of respondents stated that they could circumvent the controls currently in place to prevent access to internal information.
Twelve months after the Cyber-Ark “Trust, Security & Passwords” survey discovered that 33 percent of IT staff used their IT administration rights to snoop around networks to access privileged, corporate information such as HR records, redundancy lists, customer databases and M&A plans, a repeat of the survey has discovered that the situation has escalated.
One of the most revealing aspects of the survey was found in the types and quantity of information employees would take with them if they were fired. As the economic climate has worsened, the survey found a sharp increase in the number of respondents who say they would take proprietary data and information that is critical to maintaining competitive advantage and corporate security.
When asked this year “What would you take with you,” the survey found a six-fold increase in staff who said they would take financial reports or merger and acquisition plans, and a four-fold increase in those who would take CEO passwords and research and development plans.
Of the information targeted, respondents indicated they would be most likely to steal the following types of information:
Type of Information / 2009 / 2008
Customer Database / 47% / 35%
Email Server Admin Account / 47% / 13%
M&A Plans / 47% / 7%
Copy of R&D Plans / 46% / 13%
CEO’s Password / 46% / 11%
Financial Reports / 46% / 11%
Privileged Password List / 42% / 31%
Ominously, 1 in 5 companies admit having experienced cases of insider sabotage or IT security fraud. Of those companies, 36 percent suspect that their competitors have received their company’s highly sensitive information or intellectual property.
Organizations are increasingly aware of the need to monitor privileged account access and activity, with 71 percent of respondents indicating that privileged accounts are partially monitored, while 91 percent of those who are monitored admitting they are “okay with their employer’s monitoring activities.” Despite these efforts, 74 percent of respondents revealed that even with the controls being put in place to monitor them, they could still get around them, making current controls ineffectual.
Highlighting the ineffectiveness of current controls and access policies, 35 percent of IT administrators admitted they were using their administration rights to snoop around the network to access confidential or sensitive information. The most common areas respondents indicated they access are HR records, followed by customer databases, M&A plans, redundancy lists and lastly, marketing information.
“This survey shows that while most employees claim that access to privileged accounts is currently monitored and an overwhelming majority support additional monitoring practices, employee snooping on sensitive information continues unabated. Unauthorised access to information such as customer credit card data, private personnel information, internal financial reports and R&D plans leaves a company vulnerable to a severe data leak with the risk of financial or regulatory exposure and damage to its brand, or competitors obtaining critically important competitive information,” said Udi Mokady, CEO of Cyber-Ark.
“Cyber-Ark is committed to raising awareness around the risk of unmanaged privileged accounts. While seemingly innocuous, these accounts provide workers with the ‘keys to the kingdom,’ allowing them to access critically sensitive information, no matter where it resides. Businesses must wake up and realize that trust is not a security policy; they have an organizational responsibility to lock down sensitive data and systems, while monitoring all activity even when legitimate access is granted,” Mokady added.