Welcome!

News Feed Item

IT Security Professionals Say That the Overwhelming Majority of Security Risks Are the Result of Human Error or Attack, While Only Half of Their Budgets Are Spent to Defend Against Them

BalaBit eCSI Report Survey Conducted at RSA Conference 2014 Underlines That It Is Time to Allocate IT Security Budgeting According to Real, Human Threats

NEW YORK, NY -- (Marketwired) -- 03/25/14 -- BalaBit IT Security (www.balabit.com), a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies today announced its latest eCSI Report survey results.

Conducted among nearly 300 attendees at the recent RSA Conference in San Francisco, the survey results show that 84 percent of IT security related losses can be attributed to human elements (such as human error, sophisticated internal or external attackers) with the remaining 16 percent related to infrastructure issues (system malfunction, automated attack). The survey noted that, when it comes to budgeting, the ratio is balanced: only 55 percent of budgets are spent for managing human risk and 45 percent for infrastructure risk.

Companies still concentrate their IT security resources on infrastructure security and external risk factors. Respondents ranked the main risk factors according to their share of IT budgets in the following order:

  • 30 percent prioritized external attackers above all other risks
  • 28 percent said system malfunctions are most important
  • 17 percent said automatic attacks
  • Protection against human errors and internal attackers were a top budget priority for only a small minority of respondents (13 percent and 12 percent, respectively)

But, when IT security threats were ranked in order of potential costs, results show a very different picture:

  • 51 percent of those surveyed said that human errors cause the greatest financial loss
  • 18 percent for external attackers
  • 15 percent for internal attackers
  • 9 percent for system malfunctions
  • 7 percent for automated attacks

"The biggest difference that our survey revealed is that IT professionals clearly see that human errors cause 51 percent of their losses. But when they are planning their budget, only 13 percent of them put preventing human errors at the top of the list and even 40 percent of respondents ranked human errors as least important. If companies are aiming to spend their IT security budget responsibly, it's high time to do away with this commonly held fallacy," said Zoltán Györkő, CEO of BalaBit IT Security.

IT security experts not only need to build and maintain secure IT systems, but also need to ensure business continuity and support users do their job. RSA Conference attendees were asked to estimate how much the level of their IT security at their company is reduced by satisfying the needs of special users. 83 percent of respondents said that their security level is reduced (heavily 19 percent, notably 32 percent and moderately 32 percent), to accommodate special users.

"Access controls can be self-defeating. Because of their inflexibility, they are often not able to prevent breaches but restrict people from doing their jobs efficiently. Advanced monitoring can be effective tool against IT security risks related to human elements, regardless whether the source is external or internal. Human risks can be highly decreased by detecting and blocking suspicious user activities. Real time alerting and monitoring is inevitable for privileged accounts, which have rights to access, modify or delete sensitive company information, no wonder their credentials are the primary target for hackers. A higher rate of detection -- even during preparation -- is more deterrent than passive control and more business-friendly at the same time," Györkő added.

An infographic is available at http://bit.ly/1gDmsDz

BalaBit revealed the survey results at the recent Gartner Identity and Access Management Summit held in London.

About BalaBit

BalaBit IT Security is an innovative information security company, a global leader in the development of privileged activity monitoring, trusted logging and proxy-based gateway technologies to help protect customers against internal and external threats and meet security and compliance regulations. As an active member of the open source community, we provide solutions to a uniquely wide range of both open source and proprietary platforms, even for the most complex and heterogeneous IT systems across physical, virtual and cloud environments.

BalaBit is also known as "the syslog-ng company", based on the company's flagship product, the open source log server application, which is used by more than 1 million installations worldwide and became the globally acknowledged de-facto industry standard.

BalaBit, a fastest growing IT security software developer company based on Deloitte Technology Fast 50 CE Lists, where BalaBit has been included four times in the fast five years. The company has local offices in France, Germany, Russia, and in the USA, and cooperates with partners worldwide. Our R&D and global support centers are located in Hungary, Europe.

For more information, visit www.balabit.com.

Media Contact:
Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...