Netskope Report Surfaces Raft of Cybersecurity Challenges

A report published by Netskope today revealed that, on average, 29 out of every 10,000 enterprise users clicked on a phishing link each month in 2023.
Based on anonymized usage data collected by the Netskope Security Cloud platform, the report also found users downloaded an average of 11 Trojans per month per 10,000 users.
As a result, a typical organization of that size would have had an average of 132 Trojans downloaded by users on their network each year.
The top cloud applications where malware was detected were Microsoft OneDrive, Microsoft SharePoint, GitHub, Weebly and Outlook.com.
In general, the report noted usage of cloud applications continues to steadily increase.
The number of cloud applications accessed increased by an average of 19% per year, with users jumping from an average of 14 to 20 different apps in the past two years.
Half of all enterprise users interacted with between 11 and 33 cloud apps each month, with the top 1% using more than 96 apps per month.
Interactions with these cloud apps are increasing at an even faster rate, from just over 1,000 activities per month two years ago to nearly 2,000 activities per month today.
Most enterprise users generated between 600 and 5,000 activities per month, while the top 1% of users generated more than 50,000 activities per month.
The report also notes that the usage of generative artificial intelligence applications in the enterprise has risen sharply.
A total of 12% of the enterprise employees tracked accessed at least one generative AI application every month.
In 2023, ChatGPT was the most popular generative AI application, accounting for 7% of enterprise usage.
Ray Canzanese, threat research director for Netskope Threat Labs, said from a security perspective, generative AI applications were problematic because many end users were sharing sensitive data that might one day be used to train the next iteration of publicly accessible large language models.
Cybercriminals are already creating fake generative AI sites designed to redirect traffic, he noted.
In addition to applying controls to what data can be exposed to a generative AI application, organizations should also invest in additional training so end users could better understand the potential risks, said Canzanese.
Regardless of the type of cloud application being accessed, it's clear cybersecurity teams have their work cut out for them.
Many cloud applications are regularly used to access sensitive data across insecure networks that cybercriminals have become more adept at breaching.
In the wake of the COVID-19 pandemic, there are more end users accessing these applications from remote sites or home networks than ever.
One way or another, the overall attack surface that needs to be defended is only going to continue to expand as more SaaS applications are invoked.
The challenge, of course, is not so much to limit access to those applications as much as it is to make sure critical data isn't being stolen without anyone realizing it.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 11 Jan 2024 19:43:03 +0000


Cyber News related to Netskope Report Surfaces Raft of Cybersecurity Challenges

Netskope Announces MSP-Friendly, Enterprise-Grade SASE Tailored for the Midmarket - PRESS RELEASE. SANTA CLARA, Calif. - January 22, 2024 - Netskope, a leader in Secure Access Service Edge, today announced the next addition to its family of single-vendor SASE offerings, focused on midmarket organizations and the Managed Service ...
5 months ago Darkreading.com
Netskope Report Surfaces Raft of Cybersecurity Challenges - A report published by Netskope today revealed that, on average, 29 out of every 10,000 enterprise users clicked on a phishing link each month in 2023. Based on anonymized usage data collected by the Netskope Security Cloud platform, the report also ...
5 months ago Securityboulevard.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
6 months ago Securityzap.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
1 month ago Feeds.fortinet.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
6 months ago Securityzap.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
1 week ago Techtarget.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
5 months ago Legal.thomsonreuters.com
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
6 months ago Securityzap.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
5 months ago Securityzap.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
6 months ago Helpnetsecurity.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
7 months ago Feeds.dzone.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
6 months ago Securityintelligence.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
6 months ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
6 months ago Securityzap.com
Cybersecurity Workshops for Students - Cybersecurity workshops for students serve as an effective means to educate and empower the younger generation in protecting their digital assets. With proper planning and organization, cybersecurity workshops enable students to navigate the digital ...
6 months ago Securityzap.com
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
1 year ago Csoonline.com
Cybersecurity Curriculum Development Tips - In this article, we will explore essential tips for developing a comprehensive and up-to-date cybersecurity curriculum. By staying abreast of the latest industry trends, educational program developers can ensure that their curriculum remains relevant ...
6 months ago Securityzap.com
Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
6 months ago Securityzap.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
4 months ago Securityzap.com
Beyond Mere Compliance - Too often we continue to see executives whose approach to cybersecurity - compliance rather than protection - is strikingly similar to that of the ill-advised business owner whose minimal fire protection is designed only to meet the building code. ...
6 months ago Cyberdefensemagazine.com
Cybersecurity Competitions for Students - Cybersecurity competitions offer students a unique opportunity to develop and showcase their skills in a competitive environment. Participating in cybersecurity competitions offers students invaluable opportunities for professional growth and skill ...
6 months ago Securityzap.com
Cybersecurity for Art and Design Schools - In the digital age, art and design schools face unique cybersecurity challenges. This article aims to shed light on the importance of cybersecurity in art and design schools and provide insights into safeguarding digital portfolios and ensuring ...
5 months ago Securityzap.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
6 months ago Darkreading.com
CVE-2022-4149 - The Netskope client service (prior to R96) on Windows runs as NT AUTHORITY\SYSTEM which writes log files to a writable directory (C:\Users\Public\netSkope) for a standard user. The files are created and written with a SYSTEM account except one file ...
1 year ago
BT collaborates with Netskope to minimize the risk of cyber threats - BT and Netskope announced a partnership to bring Netskope's Security Service Edge capabilities to BT's global customers. The partnership follows a number of large customer implementations where the two companies have already collaborated to ...
6 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)