How Cloud, BYOD Strategies Create Insider Threats

How Cloud, BYOD Strategies Create Insider Threats How Cloud, BYOD Strategies Create Insider Threats Although adoption of the cloud and BYOD practices is generally perceived as positive for businesses, these shifts can fuel insider threats, a poll of cyber-security pros finds. Big Threats One in three organizations have experienced an insider attack in the last […]

Written By: Gina Roos
Oct 13, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

How Cloud, BYOD Strategies Create Insider Threats

How Cloud, BYOD Strategies Create Insider ThreatsHow Cloud, BYOD Strategies Create Insider Threats

Although adoption of the cloud and BYOD practices is generally perceived as positive for businesses, these shifts can fuel insider threats, a poll of cyber-security pros finds.

Big ThreatsBig Threats

One in three organizations have experienced an insider attack in the last year, and 74% feel vulnerable to insider threats.

More LeaksMore Leaks

56% of organizations believe insider leaks have increased in the last year.

A Big ProblemA Big Problem

66% of respondents said preventing insider attacks is more difficult than protecting against external threats.

User Behavior and Data LeaksUser Behavior and Data Leaks

One-third of organizations said careless or malicious user behavior resulted in data leakage, up slightly from a year ago.

Big ConcernsBig Concerns

71% of respondents are most concerned with inadvertent leaks that are the result of unsanctioned app usage, unintended external sharing and unsecured mobile devices. Other concerns include negligence (68%) and malicious insiders (61%).

Privileged UsersPrivileged Users

60% of organizations said privileged users, more than any other user group, posed the greatest security risk.

Employee LeaksEmployee Leaks

Cyber-security professionals believe a lack of employee training (62%) is the biggest cause of many insider leaks, followed by insufficient data protection solutions (57%), more devices with access to sensitive data (54%) and more data leaving the network perimeter (48%).

Lacking AnalyticsLacking Analytics

56% of organizations use some kind of analytics solution to address anomalous behavior, but only 15% have user behavior analytics in place and only 8% use predictive analytics. One-third do not have any analytics solutions to detect insider threats.

Vulnerable AppsVulnerable Apps

Collaboration tools (44%) were perceived as the most vulnerable to insider threats, followed by cloud storage apps (39%), finance and accounting (39%), social media (34%), custom business apps (33%), and productivity apps (28%).

Detecting Insider ThreatsDetecting Insider Threats

64% of organizations can detect a breach within a week, up from 42% a year ago. Only 23% take a month or longer to identify insider breaches.

Best Prevention ToolsBest Prevention Tools

Policies and training (57%), identity and access management solutions (52%), encryption (50%) and data leakage prevention (49%) topped the list of the best tools for preventing insider attacks.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance

Sherweb launches CyberMSP Community, offering MSPs tools, guidance, and scalable programs to deliver customized, real-time cybersecurity.

Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs

Arctic Wolf’s 2025 outlook shows MSP opportunities as insurers tackle ransomware threats and emerging AI risks through expanded security partnerships.

Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA

MetTel secures a $54M contract to modernize 15,000 VA phone lines across 1,875 locations using its POTS Transformation solution, enhancing reliability and performance.

Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.