• Products
  • Services
  • Compliance
  • Resources
  • Partners
  • En
    • Ar
    • Tr
    • Es
    • Pt
  • Book a Return Call
  • All Products
    SearchInform DLP
    SearchInform Risk Monitor
    SearchInform ProfileCenter
    SearchInform FileAuditor
    SearchInform SIEM
    TimeInformer
    Cloud solutions
    Third-party integration
    All Services
    SearchInform MSS
    SearchInform for MSSP
    SearchInform solution in the cloud
    All Resources
    White Papers
    Research
    How to
    Practices and use cases
    Videos
    All Challenges
    Abnormal event detection
    Data loss prevention
    Employee with problems
    Data visibility
    Behavioral risk management
    Measuring employee morale
    Compliance
    Time tracking & employee monitoring software
    Corporate fraud
    Ransomware protection
    Data at rest discovery
    Real time monitoring
    Data encryption
    Investigation
    Employee Profiling
    Personal data protection
    All Roles
    C-level executive
    Compliance manager
    Risk manager
    Information security analyst
    Internal audit officer
    Chief Human Resources Officer
    All Industries
    Business Services
    Technology
    Education
    Healthcare
    Financial Services
    Retail
    Government
    Energy
    Insurance
    Hospitality
    Manufacturing
    Construction
    Compliance with SearchInform
    SAMA Cybersecurity Framework
    GDPR
    Personal Data Protection Bill
    Compliance with Data Cybersecurity Controls
    Compliance with Kingdom of Saudi Arabia Personal Data Protection Law
    SearchInform Partners
    Become a Partner
    Partner login
    Events
    News
    About our company
    Blog
    Contact Us
    Language:
    • En
    • Ar
    • Tr
    • Es
    • Pt
    Follow us:
    Book a Return Call
Home — Blog — Important trends in corporate security
Back
BACK TO BLOG LIST
Important trends in corporate security
21.06.2022

In our previous blog post, we’ve described some principles for building a new complex approach to corporate security. 

In this article we’re going to continue dealing with this topic, we’ll provide a slight overview of some information security trends and advice on how top-managers may eliminate the ongoing risks.

1)    Comply with regulations

We are now witnessing plenty of different regulations coming into force throughout the world. Their adoption means that there are more and more requirements invented, which are obligatory or recommended for organizations to comply with. These regulations should have a positive impact, because despite concerning technical aspects directly, they are also corresponding with management and marketing related issues. 
The first issue – financial loss. A failure in complying with regulator’s requirement will turn into financial penalties. For example, in case regulations are violated, GDPR imposes a turnover penalty, which will anyway motivate many companies not to neglect expenditures on the information security technologies. 
The second issue concerns the image of organization – if company isn’t interested in clients’ security ensuring, then, it should be ready to face up to the situation, when their audience shifts to more privacy-driven competitors. In addition, the stricter the rules for gathering and processing user’s info are, the less info is gathered, which, of course, simply reduces the amount of data, which is at stake of being exposed. Promotion of such security acts will also raise users’ awareness and competencies in the information security sphere.
The next worth mentioning trend is filing shareholder derivative claims related to cybersecurity incidents. The case with the T-Mobile in November of 2021 is illustrative. A shareholder derivative lawsuit was filed against T-Mobile USA’s board of directors. They were accused of non-efficient monitoring and acting upon obvious red flags. The general idea of the mentioned trend is that shareholders point on the personal responsibility of CEO’s, blaming them for unpreparedness for cyber incidents. So, what directors should keep in mind? Obviously, it’s quite difficult to be a professional in the information security sphere if you haven’t studied relevant subjects in the university and if you don’t have relevant work experience. Nevertheless, as a chief officer, you have to set up business processes related with information security properly. The most fundamental principles are the following: be up-to-date and expand your knowledge on the subject; educate and motivate employees; hire real professionals and use advanced software, plan and motivate investments in information security. For more detailed explanation on how to strengthen company’s security system, you may refer to the previous article in our blog.

2)    Passwords

Now let’s have a look at some negative tendencies, which exist in the information security all around the globe. In the current circumstances, when more and more various attacks take place, people tend to focus on numerous complicated issues. Due to this, attention is often distracted from some basic principles, and some even consider them as ‘outdated’. For example, protection of passwords is still of great importance, however, many people ignore this basic aspect of information security. This may be illustrated with the recent survey, conducted by NordPass experts. They analyzed leaked passwords, belonging to different managers and heads of organizations’ accounts. According to this info we can make some conclusions. It can be stated that many top-managers seem not to care about security at all. Among the most popular password the following names, numbers, fantastic creatures and words  were spotted: “Tiffany”, “Charlie”, “Michael”, “dragon”, “monkey”, “123456”, “111111”, “info”, “qwerty”, “password”. As top managers usually have access to the most critical data, their passwords should be way more encrypted. This example illustrates that information security awareness level of many CEOs’ isn’t high enough, which, undoubtedly, poses serious risks for companies.

3)    No absolute guarantee of safety do exist 

Try to build and appropriately use complex security system, stay up-to-date and be well-acknowledged about information security threats and try to reduce “digital trail”. During past time, there were plenty of incidents, related to the sphere of information security, and it's becoming more and more obvious, that there is simply no single universal solution which guarantees total confidentiality. Everyone should understand clearly that users’ data is always at stake, at least to some extent. Recently, an incident with DuckDuckGo was revealed. DuckDuckGo positions itself as a super-protected browser. However, it was found out, that in iOS and Android browser versions at least two trackers aren’t blocked – LinkedIn and Bing, according to a non-disclosure private agreement, conducted between DuckDuckGo and Microsoft, which had been kept a secret, and non-disclosure is a prerequisite of the contract. 

4)     Email 

Email is still considered the riskiest channel for data loss. It’s accounting for 65% of data losses.  For example, according to the research by Tessian and the Ponemon Institute nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. This was closely followed by cloud file-sharing services (62%) and instant messaging platforms (57%).   According to some assessments, 90% of cyber-attacks start with phishing.  Anyway, it’s impossible to ignore this ever-lasting threat. 

5)    Investments in the information security infrastructure

When it comes to security, the necessity of investment is indisputable. Investments should be reasonable, of course, but still, they are extremely important. In order to be able to plan effective investment program, it’s crucial to obtain the full picture of what is actually happening in the security system of organization and what are the ongoing risks. 
In our previous article we argued, that it’s very important to increase the level of awareness in security-related issues among employees and managers. This may be achieved with the help of permanent education – theoretical lectures, practical tasks with case studying and trainings. Still, there is one more aspect of this issue. Let’s shift attention on the network links between companies’ executives and information security officers. It becomes more important to maintain and tighten contacts between these employees. If executives permanently receive reports, comments etc., containing description and explanation of the risks and methods, which can help eliminate them, there is a chance, that the level of executives’ literacy in information security sphere will grow steadily. The most probable outcome is to invest the required amount of money. This is an important step, because many companies don’t allocate enough funds for information security, these sums often don’t exceed 10% of overall investment. However, usage of special protective software, as well as educational practices are of high importance nowadays.

6)    Finally, the last but not the least – insider threat.

This risk is also often undervalued. Many companies report that there are plenty of risks, related to insiders’ actions, those aren’t addressed properly. For instance, according to CyberEdge group, many companies believe, that they are poorly prepared to deal with insider threat. In the list of preparedness to different threats, insider-related risks were marked number 9 out of 12. What’s more, in the list of most dangerous risks, mentioned in the same report, insider threat was ranked 10 out of 12. Still, human error or malicious behavior is one of the most threat. Even in case an external attack takes place, it often requires an insider to take part in a violation. According to Ponemon Institute report, 56% of insider incidents were caused by employee or contractor negligence, and 26% by malicious insider. The average annual cost per incident for the three types of incidents, including employee or contractor negligence, criminal & malicious insider, credential thief  accounts for $15,378,635. [2022 Cost of insider threats global report. Ponemon institute]   Neglecting of measures required to prevent insider-related risks may have far-reaching consequences. And the incident in fact starts not at the point, when intruder makes some specific actions (for example, in order to steal info), but at the time, when he or she gets access to some critical data. Let’s also examine another kind of situation, when insider acts not because of malice, but makes a mistake by negligence. This situation is even more wide-spread, but it doesn’t mean, that it’s necessarily less hazardous. In this case, once more, the incident doesn’t start when insider decides to take some actions. In both cases, the incidents’ initial points were access to some critical data.   Because, even if a person plans to take a malicious targeted action, but he or she doesn’t have an access to data and isn’t able to transmit it in any illegal way, the risk is eliminated at the earliest stage. Thus, the most effective way to deal with insider-related risks is to use specific software. For example, SIEM system helps to control access, compliance with information security policies. DCAP-system classifies data and provides users with a possibility to distinguish, which data has to be protected from the overall document flow information and sets rules, which users or groups of users have access to specific data. And DLP-system ensures, that a secure data perimeter is set up, which in turns, prevents leak of confidential and crucial data.  

BACK TO BLOG LIST
Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.
Email
FileAuditor
DLP
Risk Monitor
ProfileCenter
SIEM
MSS
MSSP
Cloud Deployment
Contact
About Our Company
Our Clients
Press About Us
Press Kit
White Papers
Third-party integration
Research
Practices and use cases
Videos
Company News
Product News
Events
Blog
Compliance
Data Loss Prevention
Investigation
Data at Rest Discovery
Data Encryption
Data Visibility
Data Classification and Protection
Time Tracking and Employee
Monitoring
Corporate Fraud Mitigation
C-level executive
Risk manager
Internal audit officer
Compliance manager
Information security analyst
Chief Human Resources Officer
Business Services
Education
Financial Services
Government
Insurance
Manufacturing
Healthcare
Retail
Energy
Hospitality
Construction
SearchInform partners
Become a partner
Partner login
SearchInform products are recognized by
Gartner The Radicati Group
Follow us:
© 2025 SearchInform LTD All rights reserved.
Terms of Use
Licence
Privacy&Cookies
Cookie settings
We use cookies to analyze our website usage, make our service more effective, and improve user experience. By continuing to use our website, you are agreeing to our policy.
Ok
Settings
Cookie Policy
✖

SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.

CATEGORY
DESCRIPTION
STATUS

Necessary Cookies

Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files record on the Internet Settings tab in your browser.

Functional Cookies

These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.

Performance Cookies

These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.

Third-party Cookies

These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.

Save Settings
✖

Please enable Functional Cookies

You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.

Cookie settings

Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time.
 

Subscribe to our newsletter and receive case studies in comics!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time.