Skip to content

Cyber Insurance News

The Leading Source for Cybersecurity Insurance News, Insights and Data

CyberArk Report Reveals Employee Behaviors Pose Widespread Cybersecurity Risks That Can Sink Companies

Posted on December 3, 2024December 3, 2024 By Martin Hinton

In 1588, a navigational error led to the defeat of the Spanish Armada, changing the course of European history. Even before modern technology’s advent, human error has had significant consequences. Unfortunately, the modern era has maintained these vulnerabilities. Today, CyberArk’s new report reveals that many of the same human errors and risky behaviors continue to pose serious cybersecurity risks and threats to organizational security in an increasingly digital and hybrid work environment.

The increasing flexibility of modern work environments has led to significant security risks, according to a new report from CyberArk, a leader in identity security. The “2024 Employee Risk Survey” reveals concerning behaviors among employees across multiple countries, highlighting the urgent need to strengthen workforce access management and secure identity security practices.

Based on a survey of over 14,000 employees in the United States, United Kingdom, France, Germany, Australia, and Singapore, CyberArk found that many workers inadvertently introduce cybersecurity risks into their organizations. As hybrid and remote work become more common, workers often access sensitive business data from personal devices, share passwords, and bypass cybersecurity measures—behaviors that expose businesses to increased cyber risks. The report emphasizes the need for a shift from merely managing workforce access to actively securing it.

Our further takeaways follow; you can get the whole report here.

Employee Access Risks Are Pervasive

One key finding is that a significant majority of employees have access to sensitive information. Alarmingly, some 80% of respondents stated that they access workplace applications—many containing critical company data—from their personal devices. Conventionally, these devices lack robust security measures. That increases the risk of data breaches. Also, 40% of employees regularly download customer data, and 33% can access and alter critical information. Finally, 30% can approve large financial transactions.

The report underscores that privileged access is no longer restricted to IT administrators. The report reveals that almost every employee, from senior executives to entry-level workers, has some level of privileged access. The rise in access to sensitive data increases the attack surface criminals might target. This makes it harder for cybersecurity teams to keep up with the threats.

CyberArk’s experts stress that this situation requires a rethink of identity security controls. Protecting against cyberattacks means ensuring every user, whether in-house, third-party or machine-based, is operating securely. The scale of employee access to company systems from unsecured personal devices reveals a stark reality and a need for a proactive security approach.

Risky Behaviors and Password Mismanagement

The report also reveals widespread risky behavior related to password usage. Nearly half (49%) of surveyed employees admitted to using the same login credentials for multiple work-related applications. Don’e look away cybersecurity experts, a further 36% use the same credentials for both work and personal accounts. Password reuse or uniformity significantly heightens the risk of a security breach. It’s like having one key that opens every lock.

Additionally, the survey found that 52% of respondents have shared workplace-specific confidential information with outsiders. It’s a bit of a no-brainer, but it’s worth saying, given the findings in the report, this practice introduces substantial risks. This is particularly true as businesses become more reliant on distributed and hybrid workforces. Many employees do not understand how such behaviors can compromise their organization’s security. This suggests that greater training and explanation are part of the solutions. CyberArk experts point out that even seemingly innocent actions, such as sharing a work password with a colleague or using personal devices to store work data, can introduce cybersecurity risks if those devices or accounts are compromised.

Workarounds to Cybersecurity Policies Are Common

Another significant finding is that employees often bypass cybersecurity policies to make their work easier. Sixty-five percent of employees admitted to circumventing company cybersecurity guidelines, often in the name of convenience. This is the digital version of propping a back door open. These workarounds include using personal devices as WiFi hotspots, forwarding corporate emails to personal accounts, or avoiding software updates that might slow them down. Obviously, such behaviors create vulnerabilities that attackers can easily exploit.

The report highlights a critical need for companies to rethink how they implement security controls. Security measures that slow down or hinder productivity are often ignored by employees who prioritize efficiency over security. Organizations should consider implementing identity security solutions that empower employees to work efficiently without compromising safety.

AI Tools Introduce New Cybersecurity Risks

The adoption of AI is widespread, with 72% of employees report using various technologies for work. While AI can enhance productivity, it also presents new challenges for security teams, especially when sensitive data is entered into AI systems. The report found that 38% of employees only sometimes adhere to company policies on using AI tools, and 8% never follow them. Furthermore, 9% of surveyed employees reported that their organization has no AI policies in place.

The growing use of AI requires security teams to adapt their strategies. Companies need clear guidelines for their use; a big part of that is ensuring that employees understand the importance of safeguarding sensitive information, even when using advanced technologies.

Balancing Security and Productivity

The report emphasizes that effective identity security should not hinder employees from doing their jobs efficiently. That’s easy to say, and it seems straightforward. Security measures must strike a balance between ensuring data safety and enabling employees to maintain productivity. The report suggests that organizations adopt a “least privilege” approach, where access to sensitive information is restricted based on necessity, thereby reducing potential attack vectors while maintaining efficiency.

As you might imagine, CyberArk has a tool for this. Their Workforce Identity Security platform is designed to help strike this balance. It focuses on intelligent privilege, controls, and secures access for all identities—both human and machine. All while ensuring employees can easily perform their duties without unnecessary friction. It’s not surprising that we hear the words “evolving threats” all the time in relation to cybersecurity. But given the lag on actions its important to emphasize that the report’s findings suggest that organizations must modernize their security strategies to accommodate the evolving workforce. And remember, this often includes remote, hybrid, and highly mobile work environments.

Conclusion: Rethinking Identity Security

The CyberArk 2024 Employee Risk Survey paints a stark picture of the current state of workforce cybersecurity. That’s how AI would put it. The more colorful way to put it is that it’s a S–t-show. The proliferation of hybrid work and the increasing number of identities with access to sensitive information means that traditional security models are no longer sufficient. All employees are potential security risks, whether through deliberate actions or carelessness. Everyone is a weak point.

In mitigating these risks, CyberArk suggests companies use a comprehensive approach to identity security that encompasses all potential attack pathways while ensuring a seamless user experience.

A secure future will require organizations to rethink how they manage identity security, implementing controls that protect sensitive data and do not get in the way of productivity. It’s not an easy balance to strike. Furthermore, security and a well-trained workforce are a perishable reality. But by embracing intelligent privilege management and leaning into modern tools like AI with proper oversight, businesses can better safeguard against the ever-expanding threat landscape.

Other News: The Role of Human Error in Cybersecurity Failures and How to Mitigate It(Opens in a new browser tab)

Other News: UK underestimates threat of cyber-attacks from hostile states and gangs, says security chief.

Martin Hinton

Martin Hinton is the Executive Editor and Publisher of Cyber Insurance News and Information. With over three decades of journalism experience across six continents, his work encompasses investigative reporting, documentaries, and coverage of cultural, political, and business news. To learn more about his career, click on his name to visit his LinkedIn page.

Cyber Insurance, Cybersecurity, Cybersecurity Report Tags:AI, AI Tools, Artificial Intelligence, cyber liability insurance, Cybersecurity, cybersecurity policies, Cybersecurity Risks, Employee Behaviors, Human Error in Cybersecurity, Password Mismanagement

Post navigation

Previous Post: Looking Ahead: Netwrix Highlights Key Cybersecurity Threats for 2025
Next Post: EU Countries Blow Off New Cyber Security Regulations & European Commission Is Not Pleased

Related Posts

  • Can the Existence of a Risk Management Program for Cyber Insurance Also Provide Legal Protection? Cyber Insurance
  • HITRUST logo featuring bold, uppercase lettering with "HI" in red and "TRUST" in dark blue, symbolizing cybersecurity and risk management.
    HITRUST Boosts Cybersecurity with AI-Powered Threat Engine Powered by Microsoft Cyber Insurance
  • Patricia Kocsondy Joins Beazley as Head of US Cyber & Tech  Cyber Insurance
  • Beazley Security Expands Leadership to Support Growth in US and Europe Cybersecurity
  • Hackers Exploit GEICO and Travelers, Leading to $11.3 Million in Fines Cybersecurity
  • Cowbell Names James Porter as Lead Underwriter for UK Cyber Insurance Cyber Insurance

Get the Cyber Insurance Newsletter

Receive weekly updates on the top news on cyber insurance.

Cyber Insurance News

Cyber Insurance News
In the wake of the Harrods hack and cyberattacks impacting other retailers, the alarming state of UK cybersecurity will be revealed in 2024. From cyberattacks hitting major UK retailers like Co-op and Harrods to small businesses struggling without protection, the message is clear—cybercrime is a national threat.

New research by Pen Underwriting reveals that while 90% of UK and Irish businesses feel secure, only 47% have dedicated cyber insurance. Even more shocking—only 18% of businesses earning under £1 million are covered. The cost isn’t just financial—real people suffer, like the couple who lost their wedding cake due to a ransomware attack.

Watch now to understand:

Why UK businesses are dangerously unprepared

How cyberattacks are more common than fires or theft

The key role of employee training, data backups, and multi-factor authentication (MFA)

Why cyber insurance is no longer optional

Visit www.cyberinsurancenews.org for the latest cyber insurance and cybersecurity updates.

#UKCybersecurity #CyberInsurance #SmallBusinessSecurity #CyberCrime
Harrods hack UK Cybersecurity Crisis: Shocking Stats, Real Victims & Business Risks. #cybersecurity
Cyber Insurance Compliance Is Reshaping Security in 2025!

Cyber insurance compliance is no longer optional—it's a driving force behind how companies build and execute cybersecurity strategies. In this video, we break down the latest insights from the 2025 State of Pentesting report:

✅ 59% of U.S. businesses now implement new security tools based on insurer recommendations
✅ 93% of CISOs are guided by mandates from insurance providers
✅ Pentesting isn't just for compliance—it's about proving you're covered and protected
✅ The average enterprise is spending $187,000+ annually on penetration testing

As premiums stabilize, cyber insurance compliance is pushing companies toward proactive, automated, and continuous risk assessment. Learn how to stay ahead, reduce exposure, and align with both regulators and insurers.

💡 Don’t forget to like, subscribe, and hit the bell to stay updated on the latest in cybersecurity and insurance trends!

#CyberInsuranceCompliance #CyberSecurity #PenetrationTesting #CISO #InfoSec #CyberInsurance #RiskManagement #Compliance2025 #EnterpriseSecurity #CyberDefense #TechTrends #InsuranceTech
Cyber Insurance Compliance Is Reshaping Security in 2025 #cyberinsurance
In this video, we break down the massive cyber insurance settlements following the CDK Global ransomware attack that rocked the automotive industry. 🚗💻

Auto giants like Asbury Automotive Group reported up to $10 million in cyber insurance recovery, while AutoNation only recently filed their claim — months after the breach! We explore the financial disclosures, the delayed responses, and what this means for car dealerships, investors, and cybersecurity preparedness.

Learn:
✔️ How cyber insurance is shaping post-breach recovery
✔️ Why SEC filings like 10-Q and 8-K matter
✔️ What lessons other businesses can learn from this
✔️ The real cost of a ransomware attack in automotive retail

🔔 Subscribe for more deep dives into cybersecurity, tech, and industry trends!
#cyberinsurance #CDKGlobal #RansomwareAttack #AutoIndustry #CyberSecurityNews
$10M Cyber Insurance Payout: CDK Ransomware Fallout Hits Auto Giants | #cyberinsurance
Load More... Subscribe

Categories

  • AI & Cyber Insurance
  • AI & Cybersecurity
  • Critical Infrastructure cyber insurance and security
  • Cyber Cat Bonds/Cyber Catastrophe Bonds
  • Cyber Insurance
  • Cyber Insurance APAC
  • Cyber Insurance Best Practices
  • Cyber Insurance Captive
  • Cyber Insurance Carriers & Brokers
  • Cyber Insurance Claims
  • Cyber Insurance EU
  • Cyber Insurance Financial Institutions
  • Cyber Insurance for Government
  • Cyber Insurance for Healthcare
  • Cyber Insurance for Schools
  • Cyber Insurance for SMEs/SMBs
  • Cyber Insurance For Startups
  • Cyber Insurance for Utilities
  • Cyber Insurance Geographic Markets
  • Cyber Insurance Industry Groups
  • Cyber Insurance Investments and M&A
  • Cyber Insurance Jobs
  • Cyber Insurance Laws & Regulations
  • Cyber Insurance Litigation
  • Cyber Insurance Market Size
  • Cyber Insurance MENA
  • Cyber Insurance News & Information Podcst
  • Cyber Insurance People
  • Cyber Insurance Policies & Strategies
  • Cyber Insurance Premiums
  • Cyber Insurance Reports
  • Cyber Insurance Settlements
  • Cyber Insurance Sunday – Upload
  • Cyber Insurance Systemic Risks
  • Cyber Insurance Tech
  • Cyber Insurance Threats
  • Cyber Insurance UK
  • Cyber Insurance Underwriting
  • Cyber Insurance Wholesaler
  • Cyber Regulations
  • Cyber War Exclusions
  • Cybersecurity
  • Cybersecurity and Credit Ratings
  • Cybersecurity for SMBs
  • Cybersecurity in Education
  • Cybersecurity Investment
  • cybersecurity jobs
  • cybersecurity M&A
  • Cybersecurity people
  • Cybersecurity Report
  • Cybersecurity Training
  • Department of Homeland Security
  • EU Cybersecurity
  • Insurance Linked Securities/ILS
  • Insurance Loss Warranty contract/ILW
  • Managed Service Providers
  • National Association of Insurance Commissioners' (NAIC) model cybersecurity law
  • Non-criminal Claims/Non-Malicious Claims
  • Opinion/Commentary
  • Personal Cyber Insurance
  • Personal CyberSecurity
  • Ransomware Insurance
  • Reinsurance
  • Risk Modeling
  • SEC Cyber Disclosure Rule
  • Small Business
  • Supply Chain Cybersecurity And Insurance

Send Ideas, Requests & Comments




    Tags

    AI Artificial Intelligence At-Bay Beazley CFC Chubb Cloud Security Coalition Corvus Cowbell Cowbell Cyber crowdstrike cyber attack Cybercrime cyber crime CyberCube cyber insurace cyberinsurance cyber insurance cyber insurance for small businesses Cyber Insurance Market Cyber liability Insruance cyber liability insurance cyberliabilityinsurance Cyber Resilience Cyber Risk Cyber Risk Management cyber security Cybersecurity cybersecurity insurance Cyber threats Data Breach Howden Lloyds Marsh Microsoft personal cyber insurance phishing Ransomware Ransomware Insurance reinsurance Resilience Risk Management SecurityScorecard small business
    • Cyber Insurance Books
    • Cyber Insurance Reports & Documents
    • Cyber Insurance Acronyms/Terms
    • Cyber Insurance Companies: Carriers, Brokers & Vendors
    • Industry Response: Potential Federal Insurance Response to Catastrophic Cyber Incidents
    • Ransomware Insurance
    • How Much Is Cyber Insurance?
    • Considerations for Buying Cyber Insurance
    • Cyber Liability Insurance Near Me
    • Cyber Insurance Quote
    • Newsletter
    • Legal Analysis & Full Text of 2023 SEC Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
    • Glossary
    • About Cyber Insurance News
    • Privacy Policy

    • Coalition Expands Cyber Insurance Partnership with MS&AD via $30M Investment Cyber Insurance
    • CFC Launches New Insurance Solution for Tech Companies Cyber Insurance
    • How to Understand & Improve Cyber Insurance Markets: Swiss Re Report  Cyber Insurance
    • Cyber Insurance People: Executives On The Move at Cowbell Cyber and AXIS Insurance Cyber Insurance People
    • BiBerk Highlights Elements of Cybersecurity Incident Response for Small Business Cyber Insurance for SMEs/SMBs
    • Eye Security Locks in €36 Million to Bolster Cybersecurity Solutions for European Mid-Market Cyber Insurance
    • Cyber Insurance-Linked Securities (ILS) Have Large Growth Potential: Fitch Cyber Insurance
    • Fears of Massive Cyber War Losses are Overblown: Catastrophic Risk Expert Cyber Insurance

    Related Cybersecurity Sites

    http://www.whatiscyberliability.com

    https://www.whatiscyberinsurance.com

    http://www.ddosattacktutorial.com

    http://www.ransomwareremovaltool.com

    Our Privacy Policy: https://cyberinsurancenews.org/privacy-policy/

    Copyright © 2024 Cyber Insurance News.

    Powered by PressBook Premium theme