Which of the following is the most damaging way that employees put your organization at risk of a security vulnerability?
Intentionally Leaking data or intellectual property (criminal insider attack)25%
Downloading a compromised file / Clicking on a malicious link32%
Phishing Emails28%
Using unauthorized apps/tools/devices etc.7%
Insufficient Passwords4%
Mishandling sensitive data3%
Other (Leave a comment!)1%
194 PARTICIPANTS
CIO in Education, 1,001 - 5,000 employees
I’d vote for a tie between downloading a malicious link and phishing emails. They are almost the same percentage and each can equally put as at enhanced risk.Content you might like
Yes39%
Yes, but third & Nth parties are still a concern39%
Mostly16%
No4%
Don't know1%
184 PARTICIPANTS
Director of IT in Healthcare and Biotech, 10,001+ employees
Here's a template that you can use: 1. Executive Summary
Background: Explain the objectives and risks and reasons the IAM is needed.
Specify the IAM governance scope (e.g., user access to systems, privileged ...read more
First day on the job10%
Sometime during their first week52%
Sometime during their first month26%
2-3 months after their hiring date6%
It depends on their role/level3%
Other (explain in the comments section)1%
298 PARTICIPANTS
Head of Cyber Security in Manufacturing, 501 - 1,000 employees
I would say, DPO and Security team both shall be involved and work hand in hand.Most of the time the legals and or DPO don't have the technical acumen to understand when data is floating to third party services.
Lets ...read more