Code42 Data Exposure Report: COVID-19 Creates Perfect Storm for Insider Risk Growth, Organizations Unprepared to Protect Sensitive Data
Minneapolis — Dec 9, 2020
- Employees are 85% more likely today to leak files than they were pre-COVID
- 59% of IT security leaders say insider threat will increase or significantly increase in the next two years
- More than half of organizations don't have an insider risk response plan
- 40% of organizations don't assess how effectively their technologies mitigate insider threats
Code42, the insider risk detection and response leader, today released its latest Data Exposure Report on Insider Risk. The study, conducted by Ponemon Institute, found that both business and security leaders are allowing massive Insider Risk problems to fester in the aftermath of the significant shift to remote work in the past year. During that same time, three-quarters (76%) of IT security leaders said that their organizations have experienced one or more data breaches involving the loss of sensitive files and 59% said insider threat will increase in the next two years primarily due to users having access to files they shouldn't, employees' preference to work the way they want regardless of security protocols and the continuation of remote work. Despite these forces, more than half (54%) still don't have a plan to respond to Insider Risks.
"Insider Risk affects every organization. It is a byproduct of employees getting their work done everyday – how they create, access and share files in today's collaboration culture. However, security teams are at a disadvantage: there is a lack of understanding of Insider Risk, which is leading to complacency, failing technologies and inadequate processes. The severity of the Insider Risk problem is being consistently overlooked, evidenced by the sharp rise in risky behavior this year," said Joe Payne, Code42's president and CEO. "Our findings show that organizations are not even measuring the efficacy of their Insider Risk mitigation programs. Inattention to Insider Risk Management, as demonstrated in this report, will threaten the future of the digital enterprise."
COVID-19 exacerbated an already growing threat
Prior to the pandemic, cloud-based collaboration technologies and workforce turnover had become major drivers of data exfiltration as insider threat programs were failing to keep pace with today's digital workplace. Insider Risk is not a new threat vector, but with our new work-from-home normal and rising employee burnout rates, employees are 85% more likely to leak sensitive files now, than before COVID. And the leaking of sensitive files isn't just theoretical – since COVID-19, 61% of IT security leaders said their remote workforce was the cause of a data breach.
Additionally, the study found:
- In the past year, 76% of IT security leaders say their organization has experienced one or more data breaches involving the loss of sensitive information contained in files.
- Of those data breaches, the two most common causes were malicious or criminal insiders and employee carelessness, followed by external attacks and system glitches.
Organizations face challenges on all fronts when dealing with Insider Risk
Today IT security leaders say it takes an average of 118 days to identify a data breach and 55 days to contain one – a nearly six month process. Why is that? Less than half of organizations (46%) have an insider risk response plan (IRRP). Of those with an IRRP, 71% apply it inconsistently or on an ad hoc basis. In addition to insufficient response planning, the majority of security tools for insider risk are not adapted to the way we work. Seventy-one percent (71%) of IT security leaders lack complete visibility to sensitive data movement.
The study also found:
- More than three-quarters (80%) of business decision makers believe they are entitled to or should own the work product they create.
- Insider risk processes are broken in 70% of organizations where the C-suite and board of directors are briefed on insider threats annually, on an ad-hoc basis, only when they request it or not at all.
- 40% say they do not regularly – or ever – assess the effectiveness of their technologies in mitigating the insider threat.
- 66% of IT security leaders believe their budget for Insider Risk is insufficient and 54% of them spend less than 20% of their budgets on Insider Risk.
With Insider Risks predicted to increase, security teams need to mature their capabilities – and DLP is not the answer
Productivity demands are requiring the use of tools that enable speed and collaboration across organizations, but security teams are largely limited in their ability to monitor those tools for risky behavior due to an over-reliance on traditional, blocking technologies. Security teams are missing the right context for the problem, and instead continue to deploy technologies that block file sharing, inevitably impacting productivity both for employees and security teams. At the same time that trends around remote work are expected to continue, budget for insider risk programs remains a concern.
The study found:
- 59% of IT security leaders say insider threat will increase or increase significantly in the next two years primarily due to users having access to files they shouldn't, employees' preference to work the way they want regardless of security protocols and the continuation of remote work.
- Employees are being disrupted while trying to do legitimate work. Over half (51%) of IT security leaders receive daily or weekly complaints about mistakenly blocking legitimate employee file activity.
- Files moving from endpoint to cloud services and applications, whether employees are on or off the network, are the biggest Insider Risk blindspots for security teams.
- More than half (53%) of security teams are blind to users moving files to untrusted domains. And 56% of security teams lack historical context into user behavior. In other words, security teams have no idea when an employee may become an Insider Risk.
Download the Report: For more details, download a free copy of the 2021 Data Exposure Report.
Methodology: The research for this report was conducted by Ponemon Institute. The survey was completed by 623 IT security leaders and 586 business decision makers from the U.S. All respondents were familiar with their organizations' approach to securing sensitive information.
- Join the conversation with Code42 on our blog, LinkedIn, Twitter and YouTube.
- Read our book, Inside Jobs: Why Insider Risk is the Biggest Cyber Threat you can't Ignore.
- Visit code42.com to learn more about our award-winning Incydr data risk detection and response solution.
- Take a spin through an interactive demo of Incydr in our free sandbox environment.