Cybriant | The "Human Factor" Important in Cyber Risk Prevention
Jan 3, 2018 | CYBERSECURITY

The “Human Factor” Important in Cyber Risk Prevention

[et_pb_section fb_built=”1″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.21.0″ hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]

As I read over the Kroll Global Fraud & Risk Report for 2017, the most common issue discussed is the threat that comes from within your organization. Current and ex-employees were the most frequently cited perpetrators of fraud, cyber, and security incidents over the past 12 months. Notwithstanding this finding, external parties were identified as active perpetrators as well.

In the survey, taken by 545 senior executives worldwide across multiple industries and geographies, 85% said that their company experienced a cyber attack or information theft, loss, or attack in the last 12 months.

How these attack happened

The survey also reveals that most cyber incidents involve more than one attack vector. Multiple, interwoven attack
vectors were identified – directly on company software, systems, and websites; via third parties through malfeasance,
attacks on their own systems, or in error; through employee error or malfeasance; and from device theft.

The highest reported attack vector was via software vulnerability, experienced by over a quarter of respondents (26%).
Employee error or accident played a role according to 22% of respondents. And attacks on the corporate website were
noted by 22% of respondents as well.

 

Cybriant | The The Perps

The findings reveal that threats most commonly come from within. Current and ex-employees were the most frequently
cited perpetrators of fraud, cyber, and security incidents over the past 12 months. Notwithstanding this finding, external
parties were identified as active perpetrators as well.

PERPETRATORS OF FRAUD

Nearly 8 out of 10 respondents (79%) cited one of the following categories as the key perpetrator:
-Senior or middle management employees of our own company
-Junior employees of our own company
-Ex-employees
-Freelance/temporary employees

PERPETRATORS OF CYBER INCIDENTS

Overall, 44% of respondents reported that insiders were the key perpetrators of a cyber incident, citing ex-employees
(20%), freelance/temporary employees (14%), and permanent employees (10%). If we also consider agents/
intermediaries as quasi-employees, noted by 13% of respondents, then the percent indicating that insiders were the
key perpetrators rise to a majority, 57%. Nearly one in three (29%) identified external players as the key perpetrators.

PERPETRATORS OF SECURITY INCIDENTS
In total, 56% of executives surveyed said insiders were the key perpetrators of security incidents, citing ex-employees
(23%), permanent employees (17%), and temporary/freelance employees (16%).

Building Cyber Resilience

The good news: 72% have introduced employee cybersecurity training and an equal percentage have employee restrictions on installing software on company devices. Detection methods rank high on the list, with intrusion detection systems, threat intelligence systems, and network operations centers next in magnitude of adoption.

The road to resiliency requires resources, analytics, creativity, understanding of human behavior, and sheer
vigilance to continuously enhance each firm’s ability to prevent, prepare, respond, investigate, and remediate fraud and
risk.

[/et_pb_text][et_pb_cta title=”What’s next for your organization? Cybriant is here to help. ” button_url=”https://www.cybriant.com/contact/” url_new_window=”on” button_text=”Let’s talk. ” _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]

Cybriant | The

Enterprise-grade managed security services to fit your mission, needs, and budget.

Let our award-winning team make sure your business is safe.

Shoot us a message to start a discussion about how our team can help you today.

Cybriant | The
Cybriant | The

“5 star company to work with”

Jessie M.