When Security Protocols Are Ignored, Expensive BEC Risks Escalate

A recent survey conducted by CyberArk reveals alarming trends in employee access behaviors in hybrid work environments across multiple countries. Here are some of the key points from the survey:

  • Insecure Access: 80 percent of employees access critical workplace applications from personal devices that lack sufficient security. This poses significant risks to organizational data and security.
  • Data Handling: 40 percent of employees routinely download customer data, and 30 percent have access to sensitive or financial information.
  • Password Reuse: The widespread reuse of passwords is another major concern, with 49 percent of employees using the same passwords for multiple work apps and 36 percent for both personal and professional use.
  • Bypassing Cybersecurity Policies: 65 percent of employees bypass cybersecurity policies, opting for workarounds like using personal devices for work-related tasks. This behavior further exacerbates security risks.
  • AI Tools: The rise of AI tools in the workplace introduces additional vulnerabilities, with over 72 percent of employees using these tools without adhering to security guidelines.

https://hrsea.economictimes.indiatimes.com/amp/news/industry/80-of-employees-access-critical-apps-on-insecure-devices-survey-finds/115968759

Commentary

All of the employee access behaviors pose a risk. However, what stands out in the survey is the bypassing of cybersecurity polices.

When employees circumvent established security protocols, they expose the organization to various vulnerabilities. For example, when employees use personal devices or unauthorized applications for work-related tasks, they often lack the necessary security measures. This makes it easier for cybercriminals to exploit these devices and gain access to sensitive organizational data.

It also creates a heightened exposure to Business Email Compromise (BEC) attacks.

BEC attacks involve the unauthorized access and manipulation of business email accounts to deceive employees, customers, or partners into transferring funds or sensitive information. Established security protocols play a crucial role in protecting against these attacks.

  • Multi-Factor Authentication (MFA): Protocols requiring MFA adds an extra layer of security by requiring users to provide two or more verification factors to access their email accounts. This makes it more difficult for attackers to gain unauthorized access, even if they have obtained the user's password.
  • Email Filtering and Monitoring: Protocols on advanced email filtering and monitoring can detect and block suspicious emails, including phishing attempts and emails with malicious attachments or links. These tools help prevent BEC attacks by identifying and stopping potentially harmful emails before they reach the recipient.
  • Encryption: Protocols requiring encrypting email communications ensures that sensitive information is protected during transmission. Even if an attacker intercepts the email, they will not be able to read the encrypted content without the decryption key.
  • Dynamic Privilege Controls: Implementing dynamic, granular privilege controls ensures that employees only have access to the information they need. This reduces the risk of unauthorized access and limits the potential impact of a compromised email account.

The final takeaway is that cybersecurity protocols are there for a reason. Organizations should strictly enforce those protocols to prevent attacks, including devastating BEC attacks.

Finally, your opinion is important to us. Please complete the opinion survey:

Product

Articles

What Are The Most Annoying Traits Of Coworkers? You Make The Call

A survey conducted by Kickresume, claims that 85 percent of employees have dealt with annoying colleagues at their workplaces. You make the call and join the conversation.

Set Written Standards To Determine Authority To Access Systems

A health benefit exchange experiences a data breach in 2023. We examine and discuss "unauthorized access" and establishing authorizations standards.

User Access Controls For Lowering Internal And External Fidelity Risks

An employee with financial access steals more than $2M for luxury items. We explore the crime and the value of limiting access to data to only a few.

Should American Employers Offer Hangover Leave? You Make The Call

A Japanese company offers hangover leave to attract and retain staff. Does that make sense for your organization? You make the call and join the conversation.

Having Multiple User Accounts Creates High Risk Of Internal Breaches

Disney is rocked by a cyberbreach caused by a "disgruntled" ex-employee. How can your organization avoid the pain of a cyberattack from an insider with grievances? We examine.