Most organizations, over-confident in their ability to stop data breaches, Centrify survey reveals

Study finds that 93% feel somewhat prepared against threats involving privileged access, the leading cause of data breaches, despite 52% not having a password vault

Tags: Centrify Corporation (www.centrify.com)Data Leakage PreventionData ownershipData protectionData recovery
  • E-Mail
Most organizations, over-confident in their ability to stop data breaches, Centrify survey reveals
By  Kevin Sebastian Published  May 30, 2019

Centrify announced results of a new survey in partnership with TechVangelism that indicate the majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector.

Seventy-nine percent of organizations do not have a mature approach to Privileged Access Management (PAM), yet 93% believe they are at least somewhat prepared against threats that involve privileged credentials. This overconfidence and immaturity are underscored by 52% of organizations surveyed stating they do not use a password vault, indicating that the majority of companies are not taking even the simplest measures to reduce risk and secure access to sensitive data and critical infrastructure.

The survey of 1,300 organizations across 11 industry verticals in the U.S. and Canada reveals that most organizations are fairly unsophisticated and still taking Privileged Access Management approaches that would best be described as “Nonexistent” (43%) or “Vault-centric” (21%).

 

More sophisticated organizations take an “Identity-Centric” (15%) approach that tries to limit shared and local privileged accounts, replacing them with centralized identity management and authentication with an enterprise directory. The most protected organizations are considered “Mature” (21%) because they address PAM by going beyond vault- and even identity-centric techniques by hardening their environment further via a number of initiatives (e.g., centralized management of service and app accounts and enforcing host-based session, file, and process auditing).


“This survey indicates that there is still a long way to go for most organizations to protect their critical infrastructure and data with mature Privileged Access Management approaches based on Zero Trust,” said Tim Steinkopf, CEO of Centrify. “We know that 74% of data breaches involve privileged access abuse, so the overconfidence these organizations exhibit in their ability to stop them from happening is concerning. A cloud-ready Zero Trust Privilege approach verifies who is requesting access, the context of the request, and the risk of the access environment to secure modern attack surfaces, now and in the future.”

The survey also revealed some specific insights about the solutions being used to control privileged access, including:

 

52% of organizations are using shared accounts for controlling privileged access.

58% of organizations do not use Multi-Factor Authentication (MFA) for privileged administrative access to servers.

51% of organizations do not control access to transformational technologies with privileged access, including modern attack surfaces such as cloud workloads (38%), Big Data projects (65%), and containers (50%).

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code