Access your Pro+ Content below.
Insider threat report tracks annual cost of theft, carelessness
This article is part of the Information Security issue of June 2018, Vol. 20, No. 3
A new insider threat report found credential theft costs more than twice as much to resolve than incidents involving insider negligence by employees and contractors. Negligent insiders are the "root cause" of most reported events and represent the highest total annual cost to companies, according to researchers. However, imposters who steal credentials cost organizations an average of $648,846 per incident, compared to $283,281 for a security event involving carelessness. The Ponemon Institute study "2018 Cost of Insider Threats: Global Organizations" looked at the direct and indirect costs of companies that experienced one or more material event caused by an insider during a 12-month period ending in January. Researchers interviewed 717 security and IT professionals in 159 organizations located in North American, Europe, Asia-Pacific, the Middle East and Africa. The job functions that participated in the insider threat report in the largest segments included CISOs (16%), IT operations practitioners (14%), IT technicians (13%) ...
Features in this issue
The internet of things has drastically expanded the scope of what enterprises need to protect, adding challenges big and small to CISOs' responsibilities.
The Ponemon Institute study "2018 Cost of Insider Threats" examines the cost to companies victimized by material insider threat incidents during the past 12 months.
The sophisticated techniques used in BEC scams differ from other email fraud in the steps taken to construct the criminal campaign. Here's how to stop these APT-style attacks.
Columns in this issue
New research shows that cybercriminals are gaining momentum with connected infrastructure and collectively earning billions annually from a cybercrime economy. Now what?
A global CISO in charge of one of the world's largest cybersecurity programs got his start on the retail floor. He's arrived just in time for the digital transformation.
Feeling less friendly after Facebook? "There is a great deal of power in being able to combine data-sources," says Jay Jacobs, security data scientist.