What are insider threats?
Protecting the Enterprise with Zero Trust Model
Are Insider Threats Real?
Insider attacks are stealthy, hideous and far reaching, because the insiders have access to an enterprise’s most critical assets and they can easily jeopardize the security and confidentiality of the organization. In fact, 85% of organizations say that they find it difficult to determine the actual damage of an insider attack, as it’s difficult to estimate the far-reaching effects of an insider attack. According to a research by Federal Computer Week cited in a Vormetric report, the greatest impacts of successful security attacks involving insiders are exposure of sensitive data, theft of intellectual property and the introduction of malware. To solidify the horror, IBM’s 2016 Cyber Security Intelligence Index reported that 60% of all the cyber-attacks in 2016 were triggered or caused by insider employees. (Of these, 75% were intended while 25% were due to negligence).
Statistics reveal that 92% malware is delivered by email, and 98% of cyber attacks rely on social engineering. Intel reports that 97% of people around the world are unable to identify a sophisticated phishing email. This is what makes humans so vulnerable to cyber attacks. The zero trust architecture makes sure that humans are not the last line of defence for an enterprise.