DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

Everyday Employee Behaviors Put Organizations At Risk: CyberArk

DigitalCIO Bureau by DigitalCIO Bureau
January 4, 2025
in Security, Tech News
0
Everyday Employee Behaviors Put Organizations At Risk: CyberArk
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

CyberArk has announced the results of new employee research that highlights the need to shift to a model where workforce access is not just managed, but secured. Driven by hybrid working and flexible access trends, a multi-country report reveals how many common employee sensitive and privileged data access behaviors – deliberate and accidental – put organizations at risk. In parallel, new research from CyberArk Labs shows how one’s online history can be a threat to employers as well as to personal lives.

Four Key Findings of CyberArk 2024 Employee Risk Survey: Harmful Employee Behaviors

Based on a survey of 14,003 employees working in all major types of job roles and vertical industries across the USA, UK, France, Germany, Australia and Singapore, the report reveals insights into prevalent employee behaviors and data access patterns. It shows that security teams must rethink how identity security controls are applied to the modern workforce.

  1. Majority Have Access to Sensitive Information : 80% access workplace applications – which often contain business-critical data – from personal devices that frequently lack adequate security controls. The survey confirms that privileged access is no longer confined to IT admins. 40% of respondents indicated they habitually download customer data; a third are able to alter critical or sensitive data; and just over three in 10 can approve large financial transactions.
  2. Password Reuse Is Common: The report highlights several worrisome habits. 49% of employees surveyed use the same login credentials for multiple work-related applications, while 36% use the same credentials for both personal and work applications. 52% of those surveyed have shared workplace-specific confidential information with outside parties. These practices significantly heighten the risk of security leaks and breaches.
  3. Majority Bypass Cybersecurity Policies: 65% of employees often bypass cybersecurity policies to make their lives easier. Common workarounds include using personal devices as WiFi hotspots and forwarding corporate emails to personal accounts.
  4. AI Adoption Creates More Security Challenges: The report also sheds light on the growing use of AI tools in the workplace. Over 72% of employees use AI tools, which can introduce new vulnerabilities when, for instance, sensitive data is inputted into them. Over a third (38%) of employees either ‘only sometimes’ or ‘never’ adhere to guidelines on handling sensitive information in their use of AI tools.

New CyberArk Labs Research: “White FAANG”

“ White FAANG: Devouring Your Personal Data ” is new research from CyberArk Labs that shows how the individual browsing and internet history of individual employees can present cyber issues for their employers, as well as to personal lives. Detailing how individual browsing history data – downloaded from technology giants like Apple and Meta – is easily stolen, it shows how an attacker might abuse this extensive information trove to serve as, for example, an attack vector into employer organizations.

The combination of worrisome employee actions and attackers’ ability to steal and capitalize on browsing history and internet usage increases risk for organizations. By implementing a robust identity security program with dynamic privilege controls at every user checkpoint, security teams can prevent attackers from gaining access to sensitive and privileged information without adding unwanted friction into workplace processes.

“For far too long, the standard approach to workforce access security has been centered around basic controls like authentication via single sign on. This ignores the reality of the modern worker and the changing nature of identity: the average employee can be a casual workforce user and, the next moment, a privileged account,” said Matt Cohen, CEO at CyberArk. “These findings show that high-risk access is scattered throughout every job role and bad behaviors abound, creating serious security issues for organizations and highlighting the pressing need to reimagine workforce identity security by securing every user with the right level of privilege controls.”

Tags: CyberArk
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Tech Mahindra Partners with Fortinet to Launch Managed SASE Solutions for Secured Digital Transformation

by DigitalCIO Bureau
April 21, 2026
0
Tech Mahindra Partners with Fortinet to Launch Managed SASE Solutions for Secured Digital Transformation

Tech Mahindra has announced a partnership with Fortinet to deliver a Managed Secure Access Service Edge (SASE) solution, aimed at enabling enterprises worldwide achieve secure and scalable digital...

Read moreDetails

Polycab India Appoints Pradipta Patro as CISO & VP – Data Privacy

by DigitalCIO Bureau
April 21, 2026
0
Polycab India Appoints Pradipta Patro as CISO & VP – Data Privacy

Polycab India Ltd., has appointed Pradipta Patro as its Chief Information Security Officer (CISO) and Vice President – Data Privacy. The move underscores the company’s continued focus on...

Read moreDetails

Abhinav Pratap Singh Elevated to Executive Director at PwC India

by DigitalCIO Bureau
April 20, 2026
0
Abhinav Pratap Singh Elevated to Executive Director at PwC India

PwC India has elevated senior consulting leader Abhinav Pratap Singh to the role of Executive Director, strengthening its finance and tax transformation advisory capabilities in the country. In...

Read moreDetails

Palo Alto Networks Announced the Completion of its Acquisition of Koi

by DigitalCIO Bureau
April 20, 2026
0
Palo Alto Networks Announced the Completion of its Acquisition of Koi

Palo Alto Networks has completed its acquisition of Koi, introducing Agentic Endpoint Security (AES) to protect against expanding AI-driven risks on enterprise endpoints. Announced by Palo Alto Networks,...

Read moreDetails

NetApp Teams Up with Google Cloud to Strengthen Data Infrastructure for Distributed Cloud

by DigitalCIO Bureau
April 17, 2026
0
NetApp Teams Up with Google Cloud to Strengthen Data Infrastructure for Distributed Cloud

NetApp announced a 4‑year Enterprise Agreement with Google Cloud to accelerate deployment of NetApp storage solutions within Google Distributed Cloud air‑gapped, Google’s sovereign cloud platform delivered in partnership...

Read moreDetails
Next Post
Cloudflare Shares Top 2025 Tech Predictions

Cloudflare Shares Top 2025 Tech Predictions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Proofpoint Appoints Bikramdeep Singh as Country Manager for India

Cyber ​​Risks Increasing: CISOs in India Expect More Attacks

August 27, 2025
Hexaware Appoints Aditya Jayaraman as Country Head, India

Hexaware Appoints Aditya Jayaraman as Country Head, India

November 14, 2025
AuthBridge Unveils GroundCheck.ai for Smarter CPV

AuthBridge Unveils GroundCheck.ai for Smarter CPV

June 25, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?