On average, new hires can access around six million corporate documents on their first day work, a new report has been called for.
Based on an analysis of four billion files in 50 different organizations, cybersecurity vendor Varonis discovered a huge data overexposure issue in the 'manufacturing industry.
"Manufacturers are sensitive, and incredibly valuable data that puts them at risk. And as we've seen with WannaCry, DarkSide, and so many other attacks, ransomwares can stop lines production and business. Too often information is overexposed and underprotected, ”said Matt Lock, CTO, Varonis. TechRadar needs you!
We are researching how our readers are using VPNs with streaming sites like Netflix so we can improve our content and deliver better This survey will take no more than 60 seconds of your time, and we would be very grateful if you could share your experiences with us.
>> Click here to start the survey in a new window
In the report Varonis argues that overexposed and under-protected data can cause all kinds of problems; employees who copy, share and delete sensitive information, to
Limit access and impact
Varonis found that on average each employee can access approximately one-fifth of the files in an organization. The number rises to a quarter forMedium and small businesses.
Worryingly, four in ten organizations have more than 1,000 sensitive files open to every employee. In fact, on average, over 27,000 sensitive files, such as those containing financial information, trade secrets or business plans, are open to anyone.
The study also reveals led to poor active directory hygiene with over half (56%) of companies surveyed having more than 500 accounts with passwords that never expire, while 44% had more than 1,000 ghost users .
Based on their findings, Varonis believes companies should proactively support data access in order to limit the damage attackers can cause.
“Companies should ask themselves three questions to better prepare for an attack: Do you know where your important data is stored? Do you know that only good pedo people have access to it? Do you know that they are using the data correctly? If you don't know the answers to these three questions, you won't be able to identify the early stages of a cyberattack, ”says Lock.