Threats

The biggest threat to your enterprise is the one no one wants to talk about.

More than 40% of all breaches are committed by insiders.*

The greatest harm to your IT operation is likely to come not from outsiders or end-users, but from infrastructure insiders—systems administrators, network architects, system analysts, developers, and site reliability engineers. Some of these people work for you, and some may work for third parties.

These people often require authorized access to systems, networks, and applications to do their jobs. However, they may accidentally expose data or make mistakes that allow others to steal or damage sensitive information. Breaches may also occur unintentionally due to lax security protocols.

 

*According to InfoSecurity magazine.

These incursions fall into three main categories:

Insiders

intentional-insider-breaches-anjuna-security

In 2019, two Twitter employees were charged with spying for Saudi Arabia by accessing information on Saudi dissidents using the Twitter platform. Hackers are also able to get root access and breach supposedly secure systems.

Third-Party Intruders

third-party-incursions-anjuna-security

The move to cloud computing compounds the problem since there is limited accountability and control over the personnel at IT cloud platform providers who are able to access your data.

A data breach at Capital One in early 2019 exposed the personal data of over 100 million bank customers and applicants. The perpetrator was a former employee of Amazon Web Services (AWS), who boasted online about what she’d done.

Bad Actors/ Nation-States

nation-states-bad-actors-anjuna-security

Bad actors present credentials that make them appear to be insiders.

Unauthorized hacking compromised the personal information of nearly 383 million Marriott guests. The incursion went undetected for nearly five years—which is not unusual. Often, these attacks aren’t detected until the stolen information is used months or years later.

Capital-One-Michael-Johnson

“Anjuna Enterprise Enclaves provide the answer to the problem CIOs and CISOs have been chasing for decades: seamlessly running trusted workloads in uncontrolled and/or hostile environments and preventing data leaks, all while maintaining productivity.”

Michael Johnson

Former CISO Capital One, former CIO Department of Energy, Current Board Member, Proofpoint

Now there’s a simple way to protect data and applications and prevent these attacks.