Standard DLP is inefficient against insider threats, according to the new research


Back to news

Standard DLP systems which primary concern of is limited by not letting employees send data outside the corporate network are not efficient against internal threats.

Global Data Exposure Report 2019 shows that 69% of security leaders don’t regard classic data loss prevention solution as an insider risk mitigation software.

Insider threats are defined as any threats posed by staff members, former employees or those on the verge of dismissal who can spur sabotage, blackmail, fraudulent activity, data breach, drop in productivity – the wide range of issues which requires the whole set of intelligent instruments.

More than 30% employees communicate via social networks, instant messengers and even private email addresses, although the companies provide them with file sharing and collaboration tools.

78% of C-level specialists revealed following links they should have avoided.

50% of security leaders and 53% of business decision makers which took part in the survey claimed that 50% of breaches within the previous 18 months have occurred due to employee negligence or malicious activity.

63% of respondents said they brought confidential information to new places of work after their dismissal, whereas 72% stated that the data they took belonged to them, not to their companies.

69% of companies admit to dealing with an insider breach and emphasise that they had a protection system installed.

78% of security leaders including those who have a standard DLP integrated are convinced that this solution is not sufficient when minimising internal threats.

That’s why today’s market provides businesses with comprehensive risk mitigation toolsets. Strong analytics combined with preset configurations and policies based on developers’ experience while working with different industries facilitate fraud discovery, detection of weak spots which require supervision, provide you with reports and show you tendencies within a company, user activity inside and outside the corporate perimeter.
Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.