Employees Cause Many Data Breaches

By Samuel Greengard

Over the last few years, there?sbeen a growing focus on multilayered enterprise security. Organizations areturning to a variety of tools and technologies to combat hackers, thieves andvandals.

However, a March surveyconducted by Ponemon Institute and Trend Micro found that all these investments,while essential, fail to strike at the heart of the problem. That?s because only8 percent of breaches are caused by external cyber-attacks.

Employee negligence ormaliciousness is the root cause of many data breaches, according to the report,?TheHuman Factor in Data Protection.? The top three root causes of thesebreaches are employees? loss of laptops or other mobile data-bearing devices(35 percent), third-party mishaps or errors (32 percent), and system glitches(29 percent). What?s more, nearly 70 percent of respondents believe that theirorganization?s security strategy isn?t good enough to stop a targeted attack.

Remarkably, 56 percent ofrespondents indicated that most breaches are discovered accidentally. Only 19percent said that their employees self-reported data breaches. In addition, 37percent said that an audit or assessment revealed the incident, and 36 percentreported that data protection technologies revealed the breach.

Unfortunately, the challengesare growing and becoming more prevalent ?because of the mobility of theworkforce, proliferation of mobile data-bearing devices, consumerization of ITand the use of social media in the workplace,? says Larry Ponemon, chairman andfounder of the Ponemon Institute.

Ponemon says that athree-pronged security approach is necessary. Organizations must secure theirnetworks from hackers and targeted attacks, but they also must deploy data-centricsecurity technology and boost awareness among employees.

In fact, today?s post-PCenvironment requires an entirely different security mindset. Among otherthings, it touches on governance, education, social media and mobilitypolicies, as well as security solutions that integrate threat and dataprotection capabilities within a unified framework.

Ultimately, organizations ?mustaddress how employees factor into overall data security,? concludes Jon Clay, asecurity technology analyst at Trend Micro. ?They must develop ways to identifywhen a data breach has occurred.?

Neuroscientist reveals a new way to manifest more financial abundance

Breakthrough Columbia study confirms the brain region is 250 million years old, the size of a walnut and accessible inside your brain right now.

Learn More

Picture of Samuel Greengard

Samuel Greengard

TRENDING AROUND THE WEB

If you grew up fearing your parents, you probably display these 8 traits (without realizing it)

If you grew up fearing your parents, you probably display these 8 traits (without realizing it)

The Blog Herald

If a man doesn’t believe you’re intellectually equal to him, he’ll often display these 8 subtle behaviors

If a man doesn’t believe you’re intellectually equal to him, he’ll often display these 8 subtle behaviors

Global English Editing

8 everyday behaviors of men who have very little self-respect and dignity

8 everyday behaviors of men who have very little self-respect and dignity

Personal Branding Blog

8 cheat codes that will help you to find your life partner, according to a relationship expert

8 cheat codes that will help you to find your life partner, according to a relationship expert

Small Business Bonfire

If a man displays these 10 behaviors, he wants to spend his life with you

If a man displays these 10 behaviors, he wants to spend his life with you

The Vessel

People who flourish in their later years tend to follow these 8 practices

People who flourish in their later years tend to follow these 8 practices

Jeanette Brown