According to a new CyberArk survey, the majority of organisations (nearly 70 per cent) do not prioritise the protection of the applications that their business depend on – such as ERP and CRM systems – any differently than how low-value data, applications or services are secured. The independent survey was conducted among 1,450 business and IT decision makers, primarily from Western European economies. Respondents indicated that even the slightest downtime affecting business critical applications would be massively disruptive, with 61 per cent agreeing that the impact would be severe.
Breaches affecting applications that are the lifeblood of business can result in punitive costs, with a 2018 report estimating the average cost of an attack on an ERP system at US$ 5.5 million.The threat actors that enterprises face are formidable – organized crime was behind 50 per cent of all breaches in 2018, with attacks using established tactics like privileges abuse to achieve their aims.
Despite the fact that more than half (56 per cent) of organisations have experienced data loss, integrity issues or service disruptions affecting business critical applications in the previous two years, the survey found a large majority (72 per cent) of respondents are confident that their organisation can effectively stop all data security attacks or breaches at the perimeter. This brings to light a disconnect between where security strategy is focused and the business value of what is most important to the organisation. An attacker targeting administrative privileges for these applications could cause significant disruption and could even halt business operations.
The survey also found that 74 per cent of organisations indicated they have moved (or will move within two years) business critical applications to the cloud. A risk-prioritised approach to protecting these assets is necessary for this transition to be managed successfully. Further industry data shows that, globally, 69 per cent of organisations are migrating data for popular ERP applications to the cloud.
“From banking systems and R&D to customer service and supply chain, all businesses in all verticals run on critical applications. Accessing and disrupting these applications is a primary target for attackers due to their day-to-day operational importance and the wealth of information that resides in them – whether they are on-premises or in the cloud. CISOs must take a prioritized, risk-based approach that applies the most rigorous protection to these applications, securing in particular privileged access to them and assuring that, regardless of what attacks penetrate the perimeter, they continue to run uncompromised,” said David Higgins, EMEA Technical Director at CyberArk.