itb-au logo
Story image

40% of businesses sacked staff due to breach of security during COVID

Almost 40% of business decision makers have laid off their staff members due to a breach of company cyber security policy since the start of the Covid-19 outbreak, according to new research from Centrify,

The research, which involved a survey of 200 UK business decision makers, found 39% of respondents admitted to dismissing employees due a breach.

It also revealed that almost two-thirds (65%) of companies have made substantial changes to their cyber security policy in response to Covid-19 and 100% remote working. Despite this, 58% agreed that employees are more likely to try and circumvent company security practices when working from home – indicating a fundamental flaw in the execution of security measures in a remote-working model.

In an effort to combat poor security practice from employees, 57% of business decision makers revealed that they are currently implementing more measures to securely authenticate employees. Such measures include biometric data checks, such as fingerprint and facial recognition technology, and other multi-factor authentication steps when gaining access to certain applications, files and accounts.

Also, more than half (55%) of businesses already have, or plan to formally ban staff from using personal devices to work from home.

“With more people than ever working from home and left to their own devices, it’s inevitable that some will find security work arounds, such as using personal laptops and not changing passwords, in order to maximise productivity," says Andy Heather, VP, Centrify.

"It’s also possible that the changes in security procedures are not being communicated well to employees, and many are practising unsafe internet usage without even realising," he says.
 
"The reality is the weakest link in any organisation continues to be the human element," says Heather.

"Combatting this issue starts from the top. CIOs and business decision makers must implement strict and transparent, cloud enabled and identity-centric security solutions. 

"This will allow companies to quickly and safely deploy scalable security privileged access management measures, which make it impossible for an employee to access company networks, applications and data, unless they are following correct procedures," he explains.

"Centrify Identity-Centric PAM is designed to handle requesters that are not only human but also machines, services, and APIs. For increased assurance, best practices now recommend strongly authenticated individual identities – not shared accounts – where least privilege can be applied," adds Heather. 

"All controls must be dynamic and risk-aware, which requires modern machine learning and user behaviour analytics. PAM must integrate and interoperate with a much broader ecosystem including the cloud providers, DevSecOps tools, containers, microservices, and more."

 

Story image
Digital enviro tech could save companies money but adoption is slow
According to a report from Frost & Sullivan and Envirosuite, environmental management tools can bring growth, innovation and bottom-line savings.More
Link image
You’re invited: The secrets to workplace happiness in the post-pandemic world
It has been a rough year for workplace wellbeing, with disruption and health concerns worrying every employee. Join Poly’s A/NZ Kickstart 2021 on 10 December from 11am AEDT, where special guest Dr Justin Coulson will share secrets to workplace happiness in the post-pandemic world. Register now.More
Story image
Nutanix brings Matt Maw onboard in new role of A/NZ head of tech strategy
The appointment and new role follows the expansion of the Nutanix A/NZ business in the fourth quarter of 2020, where it experienced 18% team growth, 13% customer acquisition growth, and a 14% rise in new partners.More
Story image
Interview: Appian's Matt Calkins on low-code & the rise of hyperautomation
A lot can change in 21 years. It takes a strong company to remain true to a few key technology ideas, and concentrate on their evolution.More
Story image
The cybersecurity risks that come with re-onshoring Australian manufacturing
As technology such as IoT, robotic process automation (RPA) and artificial intelligence (AI) reshapes the manufacturing landscape, organisations are simultaneously put at an increased risk of a cyberattack.More
Story image
Invest in tomorrow: Re-platforming core applications in the cloud
Consultants keep telling you of the need to digitally transform your business. New, stronger, market players are emerging, but internally change is hard.More