Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

User Access Given Carte Blanche Still a Problem, HP Study Says

A recent study from HP and the Ponemon Institute surveyed more than 5,500 IT professionals, from operations to security management, to gauge potential problems with user access and policy enforcement. The results? Unchecked access to data is still an issue, no matter what segment of the business world you’re looking at.

A recent study from HP and the Ponemon Institute surveyed more than 5,500 IT professionals, from operations to security management, to gauge potential problems with user access and policy enforcement. The results? Unchecked access to data is still an issue, no matter what segment of the business world you’re looking at.

Employee Access to Company Data“…increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, including database administrators, network engineers and IT security practitioners,” explains the top takeaway from HP’s commissioned research.

The survey revealed that more than half of the respondents said they are likely to be given access to company data beyond the scope of their job requirements. For example, a network administrator with access to HR data such as payroll; or a database administrator with unrestricted access to a company’s customer list.

“Customer information and general business data are at the highest risk, and the most threatened applications included mobile, social media and business unit specific applications,” the report notes.

In addition, more than 60-percent of those with access to data said they would examine it out of curiosity, not as a job function.

“This study spotlights risks that organizations don’t view with the same tenacity as critical patches, perimeter defense and other security issues, yet it represents a major access point to sensitive information,” said Tom Reilly, vice president and general manager, Enterprise Security Products, HP.

“The results clearly emphasize the need for better access policy management, as well as advanced security intelligence solutions, such as identity and privileged user context, to improve core security monitoring.”

Despite the issues with user access and control, most of those who took part in HP’s research said they have something in place policy-wise to control access. Yet, granular control and visibility were still a problem depending on the solution deployed.

Twenty-seven percent say their organizations use technology-based identity and access controls to detect the sharing of system administration access rights or root-level access rights by privileged users, and 24 percent say they combine technology with process. However, 15 percent admit access is not really controlled and 11 percent say they are unable to detect sharing of access rights.

Advertisement. Scroll to continue reading.

The main issues are enforcement, and change request tracking, along with policy issues, such as inconsistent approval processes for user access. Moreover, cost is also a factor, with many citing the expense of change request and overall user monitoring. Still, the favorite solution deployed for controlling these issues were all SIEM related.

The potential for privileged access abuse varies from country to country based on responses, with France, Hong Kong, and Italy having the greatest potential, and Germany, Japan and Singapore having the least, the report noted.

Naturally, HP offers technology to address these problems, along with other vendors in the market. While the research is important, it’s still a best bet to examine all of the various offerings when it comes to controlled access and policy enforcement, and pick the one that matches you organization’s needs and budget.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.