The Insider Threat is the most dangerous way to gain inside access to sensitive information.
Balabit surveyed 494 IT security practitioners at the Black Hat USA 2015 conference held in Las Vegas and Black Hat Europe 2015 held in Amsterdam for its recent CSI Report.
The research highlights the Top 10 most popular hacking methods:
Over 70 percent of respondents said that insiders are more risky than outsiders even when attacks are started from the outside and target an insider's privileged user accounts. When a breach occurs, outsiders normally gain access to the inside with minimal effort and the help of insiders, no matter if it's accidental or intentional.
Zoltán Györkő, CEO at Balabit says organisations should “know their enemy by knowing who is behind their user accounts, and determining whether it is a legitimate user or a masked hacker. This should be the fundamental priority in every kind of organisation's IT security strategy.”