LACK OF DILIGENCE BY LARGE ENTERPRISES CAN CREATE VULNERABILITIES

    This post was originally published here by (ISC)Ā² Management.

    While large enterprises are highly confident in their cybersecurity defenses, a new (ISC)Ā² study suggests they need to be more diligent in a couple of areas ā€“ taking action when told about security vulnerabilities and removing privileges for users who no longer need access to systems.

    TheĀ (ISC)Ā² Securing the Partner EcosystemĀ study polled respondents from both small businesses and large enterprises. Asked if theyā€™ve alerted enterprise clients to security vulnerabilities theyā€™ve discovered on the enterpriseā€™s systems, 53% of small business respondents said yes. Yet, 35% of large enterprise respondents said nothing is done about these alerts.

    In response to a question about access to enterprise partner systems, 55% of small business participants said theyā€™ve found they still have access to a former clientā€™s systems after terminating a contract or project.

    Both of these practices pose real dangers. Failing to address vulnerabilities can lead to security breaches and all the problems that come with them ā€“ downtime, loss of productivity and revenue, remediation costs and reputational damage. Failing to remove access for third parties after a business relationship ends needlessly adds a threat vector that can also lead to a breach.

    Security Practices

    The study produced some unexpected findings. For instance, it revealed that small businessesĀ donā€™t cause as many breachesĀ at large partners as previously assumed. It also showed that enterprises and small businesses employ many of the same cybersecurity best practices to protect their networks.

    For instance, 68% of enterprises use automated anti-malware scans; 64% use firewalls to block access to malicious IP addresses; 59% evaluate and report on security incidents; 59% use filters to prevent phishing; 57% encrypt sensitive data; and 54% configure user access for least privilege.

    Asked how sure they are that third parties follow the same practices, 94% of enterprise respondents said they are ā€œconfidentā€ or ā€œvery confident.ā€ This certainty is corroborated by answers from small business respondents to the same question about best practices.

    By and large, small businesses prioritize the same best practices ā€“ with some variations:

    Automatic anti-malware scans Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  71%

    Firewalls to block malicious IP addresses Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  66%

    Strong spam filters to prevent phishingĀ Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  62%

    Scan incoming and for threatsĀ Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  60%

    Evaluate and report on security incidents Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā  48%

    Ambivalence About Blame

    Although enterprises and small businesses generally agree on how to protect their networks, enterprises showed some ambivalence about whom to blame if a third party causes a breach for them? While 52% would blame the partner, 48% would blame their own company.

    In answer to a question with different wording, 69% of enterprise respondents said they would ā€œhold a third party fully responsible for any data leak or breach caused by their mishandling of our companyā€™s data.ā€

    Perhaps the ambivalence results from a self awareness that large enterprises arenā€™t as diligent as they should be in certain areas. When enterprises are alerted to vulnerabilities, they should address them as quickly as possible. If they fail to do so for whatever reason, and a breach occurs, then it becomes hard to hold anyone else responsible.

    Photo:The Merkle Hash

    Ad

    No posts to display