Next DLP today revealed that nearly three-quarters (73%) of security professionals admit to using SaaS applications that had not been provided by their company’s IT team in the past year. This is despite the fact that they are acutely aware of the risks, with respondents naming data loss (65%), lack of visibility and control (62%), and data breaches (52%) as the top risks of using unauthorized tools. Adding to this, one in ten admitted they were certain their organization had suffered a data breach or data loss as a result.
A survey of more than 250 global security professionals, conducted at RSA Conference 2024 and Infosecurity Europe 2024, also revealed that despite having a laissez-faire attitude towards Shadow SaaS, security professionals have taken a more cautious approach to GenAI usage. Half of the respondents highlighted that AI use had been restricted to certain job functions and roles in their organization, while 16% had banned the technology completely. Adding to this, 46% of organizations have implemented tools and policies to control employees’ use of GenAI.
The research also provided a snapshot of how security professionals view their organization’s training and overall understanding of the risks of Shadow SaaS:
- 40% of security professionals do not think employees properly understand the data security risks associated with Shadow SaaS and AI.
- Yet, they are doing little to combat this risk. Only 37% of security professionals had developed clear policies and consequences for using these tools, with even less (28%) promoting approved alternatives to combat usage.
- Only half had received guidance and updated policies on Shadow SaaS and AI in the past six months, with one in five admitting to never receiving this.
- Additionally, nearly one-fifth of security professionals were unaware of whether their company had updated policies or provided training on these risks, indicating a need for further awareness and education.
For further insights into the survey results, please see the full results report linked here. Or, for more information about Shadow SaaS and AI, and the possible defenses, visit the Next DLP website.
Methodology
The survey of more than 250 global security professionals was conducted at RSA Conference 2024 and Infosecurity Europe 2024. Each respondent was asked the same ten questions surrounding Shadow SaaS and Shadow AI usage within their organization, the implied security risks, and the policies and security tools their company has in place.
Today Is Patch Tuesday…. And It’s Far From Trivial This Time Around
Posted in Commentary with tags Microsoft on July 9, 2024 by itnerdToday, Microsoft released security updates, addressing more than 142 flaws, 2 actively exploited, and 2 publicly disclosed zero-day vulnerabilities. Alongside the security updates, fixes were provided for 5 critical vulnerabilities in the category of remote code execution. If you want to go into the weeds on these fixes, Bleeping Computer has the details.
Tom Marsland, VP of Technology, Cloud Range, and Board Chairman of VetSec had this comment on today’s Patch Tuesday release:
“This month’s patch Tuesday fixed five critical vulnerabilities, all of them being the more dangerous category of “remote code execution” vulnerabilities. These vulnerabilities exist in Microsoft SharePoint Server, Windows Imaging Component, and in three places within the Windows Remote Desktop Licensing Service, where an attacker could gain the ability to execute code on that server. Microsoft recommends disabling the Remote Desktop Licensing Service if it is not required in your environments and updating it as soon as possible. In SharePoint Server, a user with the Site Owner privileges could upload a file allowing them to execute the server’s code. This could be a very critical vector in the area of Insider Threats, where users with relatively low levels of access (in this case, a corporate intranet web editor) could gain system level access on a network infrastructure server. Lack of role separation and password reuse could then enable the threat actor to cause significant damage to the network.”
As usually is the case at this time of the month, it’s time to patch all the things.
Leave a comment »