Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

May 19, 2021 | ChannelPro

More than Half of U.S. Companies Hit with Privileged Credential Theft, Insider Threats in Last Year

ThycoticCentrify research shows impressive adoption of Zero Trust principles in response to rising cyberattacks on critical systems and data

ThycoticCentrify, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, today announced new research that reveals more than half of organizations have been grappling with the theft of legitimate, privileged credentials (53%) and insider threat attacks (52%) in the last 12 months. In 85% of the privileged credential theft instances, cybercriminals were able to access critical systems and/or data. In addition, two-thirds (66%) of insider threats led to abuse of administrative privileges to illegitimately access critical systems and/or data.

The research, commissioned by ThycoticCentrify with CensusWide, surveyed 150 IT decision makers across the U.S. on the most common privileged access risks and Zero Trust adoption trends. In addition to external and malicious insider threat attacks, the study found that nearly half (48%) of organizations experienced a data breach as a result of giving an employee or contractor too much access in the last year.

Based on these compromise patterns, it is not surprising that 65% of respondent companies saw their IT administrators targeted most frequently by cybercriminals, followed by engineers and developers (21%) and the C-suite (19%).

“IT administrators hold the keys to the most sensitive and mission-critical parts of the kingdom, and both internal and external attackers are taking full advantage,” said David McNeely, chief technology officer at ThycoticCentrify. “Abusing access to these systems can lead to full-scale breaches that grab headlines and impact trust in the organization. While there is no single solution that can eliminate every one of these risk factors, adopting Zero Trust principles is an excellent start.”

Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to cybersecurity, whether the threat is coming from inside or outside the network. Promisingly, nearly all respondents are somewhat familiar (33%) or very familiar (62%) with the term, especially as it relates to identity and access management (IAM).

The survey found an impressive 77% currently utilize a Zero Trust approach in their cybersecurity strategy, possibly attributed to the frequent attacks on IT. In fact, 42% listed reducing cyberthreats as the top motivator for adoption, followed by better compliance (30%), reducing privileged access abuse, and inspecting and logging traffic/access requests (both 14%). Common barriers for adoption include complicated or inadequate security solutions (57%), fear of disrupting user experience (43%), budget (38%), and staffing resources (30%).

“There are many on-ramps to Zero Trust. But with privileged identities playing such a key role in most data breaches, it makes sense to begin that journey with a modern PAM solution built around a least privilege model of access control,” said Tony Goulding, cybersecurity evangelist at ThycoticCentrify.

A large majority of respondents (83%) have incorporated a privileged access management (PAM) tool into their security infrastructure, and 89% of those PAM services support a Zero Trust approach to verify privileged users.

Complete results of the survey are available at https://charts.censuswide.com/CW7930/CW7930_VIbox.html. For more information about ThycoticCentrify solutions for managing privileged access, visit www.centrify.com.

*The survey of 150 IT decision makers across the U.S. was conducted by CensusWide in May 2021.

About ThycoticCentrify
ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify’s industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations’ data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

© Thycotic Software, LLC and Centrify Corporation 2021. Centrify® and Thycotic® are registered trademarks of Centrify Corporation and Thycotic Software, LLC respectively.

PR Contacts:                                                                                                                                     
Brad Shewmake
ThycoticCentrify              
brad.shewmake@centrify.com                                                                                                 
+1 408-625-4191                                                    

Alyssa Pallotti
Touchdown PR 
centrify@touchdownpr.com
+1 860-878-2518

SOURCE ThycoticCentrify


Editor’s Choice

EXCLUSIVE INTERVIEW: Dell’s New Chief Partner Officer Denise Millard Gets Candid on AI

February 23, 2024 |

Dell’s new chief partner officer believes that 2024 is the year that artificial intelligence becomes “real” for businesses and consumers alike.

How to Bridge the Digital Transformation Gap: An Interview with Ciaran Chu of ConnectWise

February 16, 2024 |

Here’s some advice on how MSPs can best get clients “unstuck” from their digital transformation journey.

Jabra Unveils Jabra+ for Admins, but There’s a Lot More Coming for Partners

February 16, 2024 |

Jabra takes first step in it’s journey towards full device management, but it’s only the beginning.


Related News

Growing the MSP

Explore ChannelPro

Reach Our Audience