Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Data Snooping a Big Problem at All Levels – Intellectual Property Theft a Major Concern

Snooping, the unauthorized use of access privileges to view sensitive or confidential data within an organization, is on the rise according to Cyber-Ark Software’s fourth annual “Trust, Security and Passwords” survey of senior IT professionals in the US and UK.

Cyber-Ark Software

Snooping, the unauthorized use of access privileges to view sensitive or confidential data within an organization, is on the rise according to Cyber-Ark Software’s fourth annual “Trust, Security and Passwords” survey of senior IT professionals in the US and UK.

Cyber-Ark Software

Forty-one percent of the more than four hundred respondents confessed to abusing administrative passwords in order to snoop on their colleagues – up from 33 percent in both 2008 and 2009. US respondents targeted customer databases first (38 percent versus 16 percent in the UK) with HR records most alluring to UK respondents (30 percent versus 28 percent in the US).

The good news is that organizations are trying harder to curb snooping and are installing stronger controls to prevent these incidents. It’s working. In 2009, 77 percent of respondents said they could circumvent controls on snooping. This year, the figure was down to 61 percent.

The survey found that 67 percent of respondents admitted having accessed information that was not relevant to their role. When asked which department was more likely to snoop and look at confidential information, more than half (54 percent) identified IT, a natural choice given that group’s power and broad responsibility for managing multiple systems across the organization.

Customer Lists and R&D Plans

At the macro, company-to-company level, 35 percent of respondents believe their company’s highly-sensitive information has been handed over to competitors. Ex-employees were cited as the most likely culprits.

The next most likely cause was human error, at 28 percent. External hacks and loss of mobile devices or laptops tied for third at 10 percent. The most likely types of information to end up in competitors’ hands were customer databases (26 percent) and R&D plans (13 percent).

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.