Most businesses agree that employees use business apps irresponsibly

Average employees have access to over ten sensitive business apps

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

A majority of organizations acknowledge that their employees have misused or abused access tobusiness applications, reveals a new survey.

Conducted by identity and access management (IAM) vendor CyberArk, the survey of 900 enterprise security leaders from around the world, suggests that a lack of security controls and visibility into user activity is one of the leading factors that continues to put businesses at risk.

This resonated with as much as 80% (85% in the UK) of the respondents, who suggested that the lack of visibility gave rise to the risk of insider threats and credential theft.

Security blindspots

Security blindspots

CyberArk argues that while the adoption of web applications has been beneficial to businesses, most lag in implementing the necessary security controls in order to eradicate the risk of human error, or worst still, malicious intent.

In fact nearly half (48%) of the respondents said they have limited ability to view user logs and audit user activity, which they acknowledge leaves a rather large blind spot in terms of spotting potentially risky behavior in user sessions.

“Today, any user can have a certain level of privileged access, making it ever more important that enterprises add security layers to protect the entire workforce as part of a comprehensive Identity Security strategy and Zero Trust framework,” said Gil Rapaport, general manager, Access Management, CyberArk.

This is even more worrying considering the fact that in 70% of organizations, the average end-user has access to more than ten business applications, many of which contain high-value data.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

To that end, the survey finds that the top-three high-value applications that organizations are most concerned with protecting from unauthorized access include IT service management (ITSM) apps such as ServiceNow,cloud computingplatforms such asAmazonWeb Services (AWS),Microsoft Azure, and Google Cloud Platform (GCP), and marketing and sales enablement applications such asSalesforce.

“Ensuring security and usability is key. As more high-value data migrates to the cloud, organizations should make certain the proper controls follow suit to manage risk accordingly while enabling their workforce to operate without disruption,” suggests Rapaport.

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

7 myths about email security everyone should stop believing

Best Usenet client of 2024

Smeg Combi Steam Oven review: a multi-functional countertop oven that looks stunning and cooks well