Story image

A third of IT leaders would hack for $2000 or less

21 Sep 15

IT managers could be swayed to turn to hacking for as little as a couple thousand dollars, according new research from Centrify.

The security firm says its latest research reveals some ‘dangerous gaps in protocol’ related to identity management, which is leaving businesses vulnerable to attacks.

The survey, Centrify’s State of the Corporate Perimeter, aimed to find out if corporations are as secure as they need to be

According to the findings, 24% of U.S IT decision makers hear more about office happy hours than they do about security, while 22% hear more about office birthdays and 18% hear more about kitchen etiquette.

The survey also revealed how little it would cost to persuade an IT decision maker to become a hacker. When asked if they would become a hacker for $2,000 or less, 28% respondents said yes.

“The real enemy here is lack of concern,” says Bill Mann, chief product officer of Centrify. “The technology exists, but the will does not.

“Many companies do not make this realisation until their names get splashed across headlines. But even if a company is not famous, one data leak can bring an entire business to a permanent halt,” he says.

“Furthermore, now that today’s corporate perimeter has nothing to do with physical headquarters and contains data that resides in the cloud and on the numerous devices used in the field, it’s our hope that parts one and two of the Centrify State of the Corporate Perimeter survey convince IT decision makers to take steps now to secure their assets before hackers find holes and exploit them,” says Mann.

Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Police making progress into Cryptopia breach
New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.
NEC concludes wireless transport SDN proof of concept
"Operation and management of 5G networks are very complicated and require automation and closed-loop control with timely data refinement and quick action."
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Avaya introduces private cloud delivery of its UCaaS solution
Avaya is supposedly taking a flexible hybrid approach to the cloud with these new solutions.
Data growth the growing case for managed colocation
The relentless growth of data could see colocation take on a new importance, says Jon Lucas.