Where do the majority of security breaches originate? According to a recent study from law firm BakerHostetler, human error is the biggest threat to data protection. The report found that employee negligence was responsible for 36 percent of all security incidents, with outsider theft, insider theft and malware trailing at 22 percent, 16 percent and 16 percent, respectively. Phishing rounded out the top five at 14 percent. With many firms worried about the specter of malicious hackers and sophisticated malware, it’s sobering to realize the biggest risk lies within corporate walls. But how do companies tackle the “people problem?”

Not Alone

BakerHostetler isn’t the only one crying foul about human hubris. According to CMSWire, 22 percent of cybersecurity professionals surveyed at the recent RSA conference said that human error was the greatest threat to their organizations, while CompTIA noted that 52 percent of U.S. executives worry that people-based mistakes are a growing factor in security incidents.

So what’s wrong with human users? Part of the problem is lackluster training: Despite a greater awareness of security threats and more detailed threat training, many users simply aren’t taking the lessons to heart. As a result, the rate of human error is growing along with malware threats. In addition, many users face confusion when dealing with security protocols. For example, they may not be sure when data must be encrypted or what type of encryption to use.

What’s more, workers are often faced with striking a balance between project timelines and IT security. If project goals can be achieved by sidestepping certain security standards or using cloud-based workarounds, the potential for network compromise or accidental disclosure of personally identifiable information (PII) may be seen as an acceptable risk. In addition, the use of social media remains a sticking point for data protection; even well-trained users can still fall victim to legitimate-looking phishing scams, such as the recent CareerBuilder threat.

Helping the Humans

Fortunately, there are several ways that companies can help mitigate the threat posed by humans in their organization. First is dealing with self-detection. The BakerHostetler report found that security threats were self-detected in 64 percent of cases. Unfortunately, this detection took an average of 134 days, which is far too long if companies want to recover forensic evidence or design effective mitigation strategies. Automating threat detection where possible can help mitigate this issue.

EnterpriseAppsTech also recommends several other strategies that go beyond simply “better training” for employees and target one of the most common human vulnerabilities: mobile devices. First is the use of multifactor authentication, which requires users to provider one-time keys or tokens in addition to login details. This helps prevent malicious access even if employees have been careless on social sites or have opened risky emails. Companies must also take the initiative and limit employee access to secure file systems. Unless users have day-to-day needs for specific data, it should be off-limits. Even permitted access should always be tracked and recorded in the event a breach does occur.

Despite a growing number of sophisticated malware technologies and ambitious cybercriminal groups, employees remain the weakest link in corporate data protection. While it’s not possible to eliminate people from the IT cycle entirely, the right approach can help mitigate the impact of human nature.

More from

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution?Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task.In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each other. As…

How I got started: SIEM engineer

2 min read - As careers in cybersecurity become increasingly more specialized, Security Information and Event Management (SIEM) engineers are playing a more prominent role. These professionals are like forensic specialists but are also on the front lines protecting sensitive information from the relentless onslaught of cyber threats. SIEM engineers meticulously monitor, analyze and manage security events and incidents within an organization. They leverage SIEM tools to aggregate and correlate data, enabling them to detect anomalies, identify potential threats and respond swiftly to security…

Tequila OS 2.0: The first forensic Linux distribution in Latin America

3 min read - Incident response teams are stretched thin, and the threats are only intensifying. But new tools are helping bridge the gap for cybersecurity pros in Latin America.IBM Security X-Force Threat Intelligence Index 2023 found that 12% of the security incidents X-force responded to were in Latin America. In comparison, 31% were in the Asia-Pacific, followed by Europe with 28%, North America with 25% and the Middle East with 4%. In the Latin American region, Brazil had 67% of incidents that X-Force…

Cost of a data breach 2023: Geographical breakdowns

4 min read - Data breaches can occur anywhere in the world, but they are historically more common in specific countries. Typically, countries with high internet usage and digital services are more prone to data breaches. To that end, IBM’s Cost of a Data Breach Report 2023 looked at 553 organizations of various sizes across 16 countries and geographic regions, and 17 industries. In the report, the top five costs of a data breach by country or region (measured in USD millions) for 2023…