{"id":2809,"date":"2014-11-05T18:27:03","date_gmt":"2014-11-05T18:27:03","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2809"},"modified":"2020-02-26T10:57:10","modified_gmt":"2020-02-26T15:57:10","slug":"internal-threats-accidental-sharing-leads-to-loss-of-more-data-than-software-flaws","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/internal-threats-accidental-sharing-leads-to-loss-of-more-data-than-software-flaws\/2809\/","title":{"rendered":"Internal threats: &#8220;accidental sharing&#8221; leads to loss of more data than software flaws"},"content":{"rendered":"<p>According to a global survey of IT professionals, 27% of all businesses have lost sensitive business data due to \u201cinternal IT threats\u201d in the past 12 months. Kaspersky Lab started tracking this specific kind of incident in 2011, and for the first time we see that accidental data sharing by staff now produces a greater amount of lost data than software vulnerabilities.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center\">\n<\/p><p>In 2011-2014, Kaspersky Lab detected a number of reported software vulnerabilities encountered amongst medium, large, and enterprise businesses dropped 9%, while data loss associated with software flaws also dropped 5%.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Internal #threats: \u201caccidental sharing\u201d leads to loss of more data than software flaws<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FL7c6&amp;text=Internal+%23threats%3A+%26%238220%3Baccidental+sharing%26%238221%3B+leads+to+loss+of+more+data+than+software+flaws\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Reports of accidental data leaks by staff remained steady during that time period, and the amount of lost data attributed to accidental data leaks by staff increased by 2%. It\u2019s now a high priority internal problem since \u201caccidental data leaks by staff\u201d were reported by 29% of all businesses. See the graph:<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020158\/graph-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2810\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/11\/06020158\/graph-1.png\" alt=\"graph\" width=\"713\" height=\"491\"><\/a><\/p>\n<p>Dynamics we see suggests that businesses are slowly winning their struggle with software vulnerabilities, but data loss is growing in other areas of businesses. Other examples of internal threats that lead to data loss incidents include loss of mobile devices, intentional or accidental data leaks from employees, and security failures by a third-party supplier.<\/p>\n<p>Are internal threats more or less dangerous than external ones? First, we\u2019d have to define the threats: Security failures by a third-party supplier and software vulnerabilities, in general, come from the outside yet threaten from the inside. At the same time, such pronounced external threats such as hacking and phishing exploit the weaknesses within the corporate infrastructure, whether those are technical or human in their nature.<\/p>\n<p>In practice, external and internal threats are no different in the amount of attention they require (hint: equal). Otherwise, the security of a business network looks like a territory surrounded with a barbed wire fence <a href=\"https:\/\/business.kaspersky.com\/a-hole-in-the-fence-is-there-a-partial-preparedness-to-cyberthreats\/2728\" target=\"_blank\" rel=\"noopener nofollow\">with missing sections<\/a>, while the main entrance is a huge metal gate with a coded lock.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Internal and external threats demand equal attention #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FL7c6&amp;text=Internal+and+external+threats+demand+equal+attention+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p style=\"text-align: left\">Kaspersky Lab\u2019s investigation of internal threats has also uncovered that these often occur in businesses within infrastructure sectors, which is an especially troubling development. Read more about it <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/Kaspersky-Lab-Survey-Identifies-Internal-IT-Threats-in-Businesses-and-Infrastructure-that-Lead-to-the-Most-Data-Loss\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internal and external threats may be quite different in nature, but they demand equal attention from the IT staff in order for the protection to be complete.<\/p>\n","protected":false},"author":209,"featured_media":15442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2215,2216,298,2042,961],"class_list":{"0":"post-2809","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-external-threats","10":"tag-internal-threats","11":"tag-it-security","12":"tag-it-threats","13":"tag-leaks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/internal-threats-accidental-sharing-leads-to-loss-of-more-data-than-software-flaws\/2809\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/internal-threats-accidental-sharing-leads-to-loss-of-more-data-than-software-flaws\/2809\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/internal-threats-accidental-sharing-leads-to-loss-of-more-data-than-software-flaws\/2809\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/leaks\/","name":"leaks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2809"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2809\/revisions"}],"predecessor-version":[{"id":33370,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2809\/revisions\/33370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15442"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}