3400 Bridge Parkway, Suite 101
94065 Redwood Shores, CA, us
+44 (20) 7183-2834
Imperva research: Insiders are most often responsible for data loss in businesses
Imperva survey also shows: IT security managers in businesses have significant concerns about Cloud Computing / Correlation to IT Security Trends for 2011 from the Imperva Application Defense Center (ADC)
Dietmar Kenzle, Regional Sales Director DACH & Eastern Europe: "Employees within a company, that have privileged rights, i.e. the 'insider', are increasingly becoming the focus of IT security managers. The ability to directly access company databases is enough motivation to turn a regular employee into a potential criminal. The database server is the usual target for insider employees as it is a Bastion that is easy to take and also highly rewarding. To prevent sensitive data from falling into the wrong hands companies should be aware of possible scenarios and the methods of criminal insiders. Through the use of appropriate tools, for example, third party cloud providers, security compromises may be averted or at least mitigated."
Kenzle added: "Concerns of a different kind are evident in the transfer of sensitive data to the cloud. Certainly there will be common problems in the foreseeable future as current research shows that many companies are still skeptical about this step. Many perceive the risks in having all their information stored in a virtual stratum to be too great as it still remains to be seen which security mechanisms will provide the most reliable protection. The use of a web application firewall - especially in a third-party managed service - is an essential building block made within a security framework for the cloud."
What will IT security managers face in 2011?
The survey findings correlated with the latest IT security trends for 2011 which Imperva published in their annual report in November. Analysis of data security incidents by the Imperva Application Defense Center (ADC) in the past year showed that IT security managers will have to face 2011 with challenges in three key areas:
- The protection of mobile devices will play a more important role. Providing more complex identification and authentication solutions for mobile devices will become a particular area of focus due to the expected increase in the volume of mobile malware attacks.
- A late reaction. Companies will start to move part of their data storage and applications to the Cloud, culminating in the gradual establishment of Cloud-based data security solutions by the end of 2011.
- Possible increase in the State support of cyber-attacks such as Stuxnet will build on the concepts and techniques of the commercial hacking industry; thus an increase in unnoticed and ongoing spy networks (Advanced Persistent Threats (APT)) will be made possible.
Amichai Shulman, CTO of Imperva, said: "We expect, in the coming months, clearly different threat scenarios that will provide data security managers with a number of major challenges. The biggest potential danger is posed by the growing proliferation of advanced mobile devices used to access corporate networks. I expect that we will, next year, see the first major data security incident that will be caused by such high-risk devices. In addition, incidents which are based on advanced techniques for permanent spying networks will become an increasingly major problem to businesses - political and financial gain being the most prominent driving forces of these issues."
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to firstname.lastname@example.org.