New Research from CyberArk Reveals Security Risks Introduced by Everyday Employee Behaviors
Privileged access combined with worrisome worker actions compound security risks for organizations
Four Key Findings of
Based on a survey1 of 14,003 employees working in all major types of job roles and vertical industries across the
- Majority Have Access to Sensitive Information: 80% access workplace applications - which often contain business-critical data - from personal devices that frequently lack adequate security controls. The survey confirms that privileged access is no longer confined to IT admins. 40% of respondents indicated they habitually download customer data; a third are able to alter critical or sensitive data; and just over three in 10 can approve large financial transactions.
- Password Reuse Is Common: The report highlights several worrisome habits. 49% of employees surveyed use the same login credentials for multiple work-related applications, while 36% use the same credentials for both personal and work applications. 52% of those surveyed have shared workplace-specific confidential information with outside parties. These practices significantly heighten the risk of security leaks and breaches.
- Majority Bypass Cybersecurity Policies: 65% of employees often bypass cybersecurity policies to make their lives easier. Common workarounds include using personal devices as WiFi hotspots and forwarding corporate emails to personal accounts.
- AI Adoption Creates More Security Challenges: The report also sheds light on the growing use of AI tools in the workplace. Over 72% of employees use AI tools, which can introduce new vulnerabilities when, for instance, sensitive data is inputted into them. Over a third (38%) of employees either ‘only sometimes’ or ‘never’ adhere to guidelines on handling sensitive information in their use of AI tools.
“White FAANG: Devouring Your Personal Data” is new research from
The combination of worrisome employee actions and attackers’ ability to steal and capitalize on browsing history and internet usage increases risk for organizations. By implementing a robust identity security program with dynamic privilege controls at every user checkpoint, security teams can prevent attackers from gaining access to sensitive and privileged information without adding unwanted friction into workplace processes.
“For far too long, the standard approach to workforce access security has been centered around basic controls like authentication via single sign on. This ignores the reality of the modern worker and the changing nature of identity: the average employee can be a casual workforce user and, the next moment, a privileged account,” said
Further reading:
-
-
1Research was conducted by Censuswide among a sample of 14,003 employees who use a computer for work in the
About
Copyright © 2024
View source version on businesswire.com: https://www.businesswire.com/news/home/20241203942566/en/
Investor Relations:
617-558-2132
ir@cyberark.com
Media:
+44 (0) 7841 673378
press@cyberark.com
Source: