WhatsApp Messenger, Facebook Messenger, and Waze topped the list as the riskiest apps most often found in the enterprise according to the latest report by Appthority. Employees using those apps may pose an even great threat.
“The Appthority report underscores the risks that insider threats can pose to a company. While data breaches that grab headlines are often perpetrated by external threats, at least half of all security breaches are carried out by insiders–from malicious insiders, to negligent employees, to third parties. What’s more, insider threats are harder to detect or prevent on the one hand and can exact the most damage on the other. Insider threats require a holistic approach that combines heightened cybersecurity awareness with better controls. Companies should conduct a more thorough internal segmentation of who can have access to what information and apps, provide more effective employee awareness training, carefully vet employees, and closely watch their third parties. This last point is crucial because third parties are popular targets of malicious actors. As companies face a growing number of regulations that exact heavy penalties for the unauthorized collection and sharing of consumer data, they will need to address the ever present threat of data breaches from within.”
Ben Herzberg, Director of Threat Research at Imperva:
“Regardless of minor percentage changes in the incident reporting, this reinforces the notion that companies should not assume that their internal network is safe from threats. These can be due to bad practices or malicious activity, but the result may be the same (Loss of Intellectual Property and other secrets, sabotage and more). This is especially challenging when the “typical” network architecture is changing rapidly to include an increasing number of public cloud services.
I’m not sure if GDPR is the cause of the change in the statistics gathered, but with or without GDPR: it’s important for organizations to know exactly where they store their data, and be accountable for it.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.