New research from Clearswift reveals the vast majority of security incidents originate from within the extended enterprise and not as a result of a hacking group.

After surveying 600 senior business decision makers and 1,200 employees across the US, UK, Germany, and Australia, Clearswift found that 42% of IT Security incidents occurred due to the actions of employees, whilst 74% originate from the extended networks of workers, customers & suppliers. That’s compared to the 26% of attacks that came from parties unknown to the organization.

Businesses are often time fixed on the idea of hackers infiltrating their IT network when where they really should be looking is right in front of them. Instead of only focusing on the latest security threats, NNT suggests organizations take a look in their own backyard and try to better educate the organization’s biggest vulnerability- its own employees.

Dr. Guy Bunker, SVP of Product at Clearswift claims, “Educating employees about how to safeguard critical information, motivating employees to care more about the ramifications of a breach, and increasing investment in Data Loss Prevention (DLP) are the biggest priorities needed to minimize the risk of internal security breaches.”

The report also found that organizations are becoming quicker at spotting incidents on the network, with more than half (52%) noticing an issue within an hour.

NNT is a firm believer that you may not be able to stop every breach, but you should always be able to spot one. The chances of stopping every breach within your organization are highly unlikely with a prevention only strategy in place. However, with non-stop, continuous visibility of what’s going on in the IT estate, your organization can spot in real-time the unusual changes that may represent a breach, and allow you to take action before it is too late. With NNT’s real-time, continuous, change detection with File Integrity Monitoring, changes will be detected and alert you of any breach activity within seconds of an incident.

Unlike a traditional vulnerability scanner, our FIM tool takes a one-time baseline of all system and configuration files which includes: registry settings, installed software, running processes and services, user accounts, security and audit policy settings. In other words, all the attributes that will reflect breach activity. From then on only changes will be tracked, which requires minimal resources. The result is continuous, real-time breach detection without the resource overhead and stop-start operation of the scanner.

 

Read this article on InfoSecurity Magazine

 

 

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.