Menu
CyberArk: Top security predictions for 2015

CyberArk: Top security predictions for 2015

"The prevalence of poor password policies is mind boggling..."

CyberArk has outlined its security predictions for 2015, with the industry expert claiming the recent cyber attacks on Sony is in fact the norm, and not an anomaly.

"In terms that Sony is being called out for in terms of poor security are very common across enterprises," the CyberArk report claims.

"The prevalence of poor password policies is mind boggling – CyberArk sees this all the time when we meet with prospective customers at large Global 2000 enterprises."

According to CyberArk, distributed in New Zealand by Connector Systems, the company regularly encounters unknown/undiscovered service accounts, through privileged passwords that have not been changed in as many as 25 years.

Below are the company's top security predictions for 2015:

Reign of the insider threat

The insider threat is expected to take centre stage, with greater sophistication, in the security landscape in 2015 as they have proven to be the quickest way to breach networks and steal data.

"Rogue employees today not alone collaborate with external cybercriminals and are armed with sophisticated technologies," CyberArk states.

"Organisations will start to be more aware that insider threats cost more than being breached by an external attacker, and continue to invest more in behaviour indicators and classifying data and monitoring access."

The Kevin Bacon effect of Remote Access

The ‘six degrees’ that separate attackers from your IP / data often include a vendor with access to your systems or other remote access.

Threat investigators have traced attacks to non-traditional targets such trucking companies and all types of professional services firms, from management consultants and auditors to litigation attorneys, frequently as a key step in an attack on a business partner.

"Our research shows 60 per cent of businesses now allow third-party vendors remote access to their internal networks," CyberArk explains.

"Of this group, 58 per cent of organisations have no confidence that third-party vendors are securing and monitoring privileged access to their network."

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags BYODsecuritymobilityCyberArkbig dataIoT

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments