Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Almost three-quarters of the world’s government entities had their security compromised in 2016, Netwrix survey reveals

August 2017 by Netwrix

Netwrix Corporation announced industry sector findings for government entities in its 2017 IT Risks Report. The report finds that close to three out of every four (72%) government bodies experienced security incidents. They also fall short of other industry sectors in extending security visibility beyond the traditional perimeter into areas such as shadow IT and cloud infrastructure.

The report divides IT risks into three areas: security, compliance and operations.

Among the key findings for government entities are:

• 72% of government entities experienced security incidents in 2016; the most common reasons were human errors and insider misuse.
• 75% of government entities do not have any visibility into BYOD, 67% lack insight into shadow IT, and 60% have no visibility into their cloud infrastructures.
• 57% of government entities focus on endpoint protection.
• 100% of respondents from the government sector see employees as the biggest threat to security.
• Only 14% of government entities consider themselves to be well prepared to beat IT risks.
• The IT departments of government agencies are mainly restrained by lack of time (57%), insufficient budget (43%), and IT infrastructure complexity (43%).
• Government entities are willing to invest in protection against intellectual property theft (43%), data breaches (29%) and fraud (14%).

“Government entities have to embrace the new cyber security reality. While they continue to focus on the traditional perimeter-defense approach, the world has changed, and they are not prepared for new threats,” said Michael Fimin, CEO and co-founder of Netwrix. “Government agencies need to gain visibility into what is happening across all of their critical assets — both outside and inside the perimeter. With user behaviour analytics at their fingertips they can stay on top of abnormal activity caused by human errors, malicious insiders and outside attackers.”

See previous articles


See next articles