80% of organizations have seen employees abuse and abuse access to business apps


Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats and credential theft, CyberArk research finds.

While the adoption of web applications has brought flexibility and increased productivity, organizations often lag behind in implementing the necessary security controls to mitigate the risk of human error or malicious intent.

Organizations have limited ability to view user logs and audit user activity

The global survey of 900 corporate security executives found that 80% of organizations have seen employees abuse or abuse access to corporate applications in the past year. This is because 48% of organizations surveyed said they had a limited ability to view user logs and audit user activity, leaving a blind spot for detecting potentially risky behavior during user sessions.

Consider financial, healthcare, marketing, or development web applications that contain sensitive and high-value data such as financial records, customer or patient information, or intellectual property. Most security and compliance teams have limited resources, visibility, and control over how sensitive data is handled or what is done during a user session.

According to the study, in 70% of organizations, the average end user has access to more than 10 business applications, many of which contain high-value data, creating plenty of opportunities for a malicious actor. To that end, the top three high-value applications that businesses most wanted to protect against unauthorized access were IT service management applications such as ServiceNow, cloud consoles such as Amazon Web Services, Azure, and Google Cloud. Platform and applications for marketing and sales support. like Salesforce.

Investigating questionable user activity should be a priority

For many security teams, investigating questionable user activity represents a significant investment of time and limited resources, and must be balanced with other priorities such as improving incident response and enforcement. consistent controls across applications to reduce the threat of credential theft.

According to the research:

  • 54% of organizations investigate user activity resulting from security or compliance incidents at least once a week, compared to 34% of organizations that investigate monthly.
  • Forty-four percent of organizations said they should enable the same security controls on all applications amid disparate integrated application controls.
  • Forty-one percent of those surveyed said that better visibility into user activity would allow them to identify the source of a security incident more quickly.

“Ensuring safety and user-friendliness is essential. As more and more high-value data migrates to the cloud, companies must ensure that the appropriate controls follow to manage risk accordingly while allowing their staff to operate without disruption, ”said Gil Rapaport. , Managing Director, Access Management, CyberArk.

“Today, any user can have some level of privileged access, which makes it increasingly important that companies add layers of security to protect the entire workforce within the framework. a comprehensive identity security strategy and zero trust framework. “

Source link

Leave A Reply

Your email address will not be published.