• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home News Stories

Third-party user practices expose Singapore Orgs to cybersecurity risks

FutureCIO Editors by FutureCIO Editors
December 10, 2019

Many organisations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, according to a new study commissioned by One Identity.

Based on a Dimensional Research-conducted survey of more than 1,000 IT security professionals, the research evaluates organisations’ approaches to identity and access management (IAM) and privileged access management (PAM). It includes how they apply to third-party users – from vendors and partners, to contractors and seasonal workers. 

Among the survey’s most noteworthy findings for Singapore are that while 92% of organisations grant third-party users access to their network, 60% admit they are unsure if those users attempted to or successfully accessed files or data they are not authorised to access, hinting towards a huge security lapse.

According to Gartner, the majority of organisations today rely on an increasing number of third-parties for business services compared to three years ago. With an expanding group of users gaining access to an organisation’s network comes an expanding cybersecurity risk surface. It is critical that businesses take proper steps to manage and govern third-party users and their access in the same way that they manage and govern internal users. However, One Identity’s survey reveals that many organisations are not implementing strong user governance and access practices, leaving them vulnerable to cyber compromise. 

Access is ubiquitous

The study reveals that 94% of respondents say that third parties have access to their network while 74% give third-parties privileged (administrative or superuser) access. Only 21% know for certain their third-party users are not attempting to access or are successfully accessing unauthorised information.

Meanwhile, 13% report third parties have attempted to or successfully accessed unauthorised information; more than three in five (66%) don’t know for certain if this has happened. 

Ineffective practices are widespread

Only 22% of organisations immediately deprovision (or revoke access for) third-party users when the work they do for the company ceases.

One-third (32%) of organisations take more than 24 hours to deprovision third-party users or do not have a consistent deprovisioning process.

Trusting too much

Only 13% are very confident that their third parties’ follow access management rules, such as not sharing accounts and ensuring password strength.One in five (19%) suspect third parties do not follow the rules or know for certain they do not.

However, 38% of respondents trust third-party users the same amount or more than they do their own employees to follow their organisations’ security policies.

Retail is the most at-risk industry

Nearly three in ten (27%) retail organisations admit third-party users have successfully accessed or attempted to access files or data that they were not authorised to access. 

One in five (20%) of financial services organisations, 17% of technology organisations, and 14% of healthcare organisations have experienced the same.

One in four (25%) respondents from retail organisations say they give all or most of their third-party users privileged access. By comparison, the same holds true for 18% of technology organisations, just 10% of healthcare organisations and only 10% of manufacturing organisations. 

“Third-party users are necessary in the day-to-day operations of most modern organisations; however, if third-party access is improperly managed, the security risk associated with these users is detrimental,” said Darrell Long, Vice President of Product Management, One Identity. “Organisations must recognise that their security posture is only as strong as its weakest link (typically third parties connected to their network), making it absolutely vital that they manage third-party identities and access just as they would their own employees’.”

“The results of our 2019 survey indicate third-party attacks are disruptive to organisations, with all respondents in Singapore reporting some sort of impact to their organisation due to unauthorised access to sensitive information. While organisations in Singapore have taken steps to mitigate the risk of third-party data breaches, there are still an alarming number who overlooked the possibility of these users acting as conduits for potential breaches. The leak of over 1.26 million individuals' personal information on a logistic platform in Singapore shows that having the right identity-centric strategy to secure privileged credentials needs to be a priority for organisations to prevent sensitive information from falling into the wrong hands,” said Serkan Cetin, Technical Director, APJ, One Identity. 

In order for organisations to prevent becoming the next victim of a breach due to unauthorised third-party user access, as has happened in prominent recent breaches, a strong security posture built around privileged access management (PAM) and identity governance and administration (IGA) is critical. According to One Identity’s “Third-party Access and Compromise” study, many companies struggle to implement some of the most basic PAM and IAM practices when managing third-party users, such as immediately deprovisioning users and ensuring rules for managing access (such as not sharing accounts and credentials) are being followed. 

Related:  New Payara cloud subscription model aims to simplify cloud adoption
Tags: Dimensional Researchidentity and access managementone identityPrivileged Access Management
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe