Menu
CyberArk: Top security predictions for 2015

CyberArk: Top security predictions for 2015

"The prevalence of poor password policies is mind boggling..."

CyberArk has outlined its security predictions for 2015, with the industry expert claiming the recent cyber attacks on Sony is in fact the norm, and not an anomaly.

"In terms that Sony is being called out for in terms of poor security are very common across enterprises," the CyberArk report claims.

"The prevalence of poor password policies is mind boggling – CyberArk sees this all the time when we meet with prospective customers at large Global 2000 enterprises."

According to CyberArk, distributed in New Zealand by Connector Systems, the company regularly encounters unknown/undiscovered service accounts, through privileged passwords that have not been changed in as many as 25 years.

Below are the company's top security predictions for 2015:

Reign of the insider threat

The insider threat is expected to take centre stage, with greater sophistication, in the security landscape in 2015 as they have proven to be the quickest way to breach networks and steal data.

"Rogue employees today not alone collaborate with external cybercriminals and are armed with sophisticated technologies," CyberArk states.

"Organisations will start to be more aware that insider threats cost more than being breached by an external attacker, and continue to invest more in behaviour indicators and classifying data and monitoring access."

The Kevin Bacon effect of Remote Access

The ‘six degrees’ that separate attackers from your IP / data often include a vendor with access to your systems or other remote access.

Threat investigators have traced attacks to non-traditional targets such trucking companies and all types of professional services firms, from management consultants and auditors to litigation attorneys, frequently as a key step in an attack on a business partner.

"Our research shows 60 per cent of businesses now allow third-party vendors remote access to their internal networks," CyberArk explains.

"Of this group, 58 per cent of organisations have no confidence that third-party vendors are securing and monitoring privileged access to their network."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags BYODbig dataIoTCyberArk

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments