THE MOST DANGEROUS CYBER SECURITY THREAT MIGHT BE … · 2018. 8. 26. · Compromised Users 54% of...

1
THE MOST DANGEROUS CYBER SECURITY THREAT MIGHT BE SITTING NEXT TO YOU 1 2015 Vormetric Insider Threat Report 2 Unless, specified all other stats from: 2015 Verizon Data Breach Investigation Report 3 California Data Breach Report 4 California Data Breach Report 5 California Data Breach Report © 2016, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula, Skyfence, CounterBreach andThreatRadar are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders. Malicious Users 10.6 % of confirmed data breaches were caused by insider misuse 2 55 % of insider misuse incidents were the result of privilege abuse 14 % of incidents were caused by misuse in the financial sector 3 Compromised Users 54 % of breaches are caused by malware and hacking 4 23 % of recipients open phishing messages and 11 % click on attachments 5 malware events occur every second Careless Users 8.1 % of confirmed data breaches were caused by miscellaneous errors 50 % of incidents were caused by errors in the government sector 5 60 % of miscellaneous errors accounted for system administrators Department: Technical Writing Action: Copies over 100,000 files to a personal device over the course of three weeks Department: Finance Action: Typically accesses company financial data via PeopleSoft Application Department: Marketing Action: Often shares marketing plans with his team using Microsoft Office 365 Department: IT Operations Action: Continuously performs maintenance on a production database using his dedicated database account Department: Database Administration Action: Attempts to access sensitive application tables using a service account Department: Sales Action: Often uploads sensitive customer information to Salesforce Department: Engineering Action: Typically accesses source code three times a week, similar to the rest of the Engineering team Department: Sales Action: Frequently updates quarterly sales pipeline numbers in NetSuite Department: Legal Action: Frequently stores valuable intellectual property in the Legal department folder with tight permission controls Department: Human Resources Action: Backs up enterprise data using personal cloud service Read the Hacker Intelligence Initiative (HII) Report to learn about the latest insider threat findings from Imperva. TOP 3 LOCATIONS WHERE DATA IS AT RISK IN VOLUME 1 DATABASES (49%) FILE SERVERS (39%) CLOUD (36%)

Transcript of THE MOST DANGEROUS CYBER SECURITY THREAT MIGHT BE … · 2018. 8. 26. · Compromised Users 54% of...

Page 1: THE MOST DANGEROUS CYBER SECURITY THREAT MIGHT BE … · 2018. 8. 26. · Compromised Users 54% of breaches are caused by malware and hacking 4 23% of recipients open phishing messages

THE MOST DANGEROUS CYBER SECURITY THREATMIGHT BE SITTING NEXT TO YOU

1 2015 Vormetric Insider Threat Report2 Unless, specified all other stats from: 2015 Verizon Data Breach Investigation Report3 California Data Breach Report4 California Data Breach Report5 California Data Breach Report

© 2016, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula, Skyfence, CounterBreach andThreatRadar are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders.

Malicious Users

10.6% of confirmed data breaches were caused by insider misuse 2

55% of insider misuse incidents were the result of privilege abuse

14% of incidents were caused by misuse in the financial sector 3

Compromised Users

54% of breaches are caused by malware and hacking 4

23% of recipients open phishing messages and 11% click on attachments

5 malware events occur every second

Careless Users

8.1% of confirmed data breaches were caused by miscellaneous errors

50% of incidents were caused by errors in the government sector 5

60% of miscellaneous errors accounted for system administrators

Department:Technical Writing

Action:Copies over 100,000 files to a personal device over the course of three weeks

Department:Finance

Action:Typically accessescompany financial data via PeopleSoftApplication

Department:Marketing

Action:Often shares marketing plans with his team using Microsoft Office 365

Department:IT Operations

Action:Continuously performs maintenance on a production database using his dedicated database account

Department:Database Administration

Action:Attempts to access sensitive application tables using a service account

Department:Sales

Action:Often uploads sensitive customer information to Salesforce

Department:Engineering

Action:Typically accesses source code three times a week, similar to the rest of the Engineering team Department:

Sales

Action:Frequently updates quarterly sales pipeline numbers in NetSuite

Department:Legal

Action:Frequently stores valuable intellectual property in the Legal department folder with tight permission controls Department:

Human Resources

Action:Backs up enterprise data using personal cloud service

Read the Hacker Intelligence Initiative (HII) Report to learn about the latest insider threat findings from Imperva.

TOP 3 LOCATIONS WHERE DATA IS AT RISK IN VOLUME 1

DATABASES (49%)

FILE SERVERS (39%)

CLOUD (36%)