Talon Cyber Security Unveils Research on How Third-Party Workers Contribute to Enterprise Risk

Survey Results Reveal Multitude of Actions, Devices, and Security Tools that Leave Organizations Vulnerable

Talon Cyber Security, the leader in secure enterprise browser technology, today published its 2022 Third-Party Risk Report, unveiling an analysis of the ways that third-party workers increase security risks that leave organizations vulnerable to data breaches.

For the research, Talon surveyed 258 third-party workers, including contractors and freelancers, to better understand the state of third-party working conditions, including work models, types of devices and security technologies used, potentially risky actions taken, and how security and IT tools impact productivity.

“It is well documented that third-party workers can increase risk,” said Ohad Bobrov, co-founder and CTO, Talon Cyber Security. “Looking at recent high-profile breaches, third parties have consistently been at the epicenter, so we took a step back with this research to better understand the potential root causes. The findings paint a picture of a third-party work landscape where individuals are consistently working from personal, unmanaged devices, conducting risky activities, and having their productivity impacted by legacy security and IT solutions.”

Third parties and contractors often access corporate data from personal devices

Most third parties (89%) work from personal, unmanaged devices, which organizations lack visibility into and cannot enforce the enterprise’s security posture on. This is a concerning figure, due to the fact that Microsoft estimates users are 71% more likely to be infected on an unmanaged device.

Risky behaviors from third parties leave organizations vulnerable

With third parties working from personal devices, they tend to carry out personal, potentially risky tasks. Respondents note that at least on occasion, they have used the device they work from to:

  • Browse the internet for personal needs (76%)
  • Indulge in online shopping (71%)
  • Check personal email (75%)
  • Save weak passwords in the web browser (61%)
  • Play games (53%)
  • Allow family members to browse (36%)
  • Share passwords with co-workers (24%)

Legacy security approaches impact productivity

Analyzing the technologies that third parties use to access corporate applications and data, Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) solutions are prominent, with 45% of respondents using such technologies while working for organizations.

Despite widespread adoption, VDI and DaaS can create environments that are complex, expensive, and deliver poor user experiences. In fact, nearly half of respondents (48%) said IT and security tools impact their productivity in some way – a trend that industry leaders should monitor to ensure the technologies they deploy do not prevent workers from conducting their job responsibilities.

To see the full analysis, download a copy of the 2022 Talon Cyber Security Third Party Risk Report: https://talon-sec.com/resources/ebook/talon-cyber-security-third-party-risk-report/.

To learn more about how Talon’s secure enterprise browser is redefining security for the modern enterprise, visit www.talon-sec.com.

About Talon Cyber Security

Talon Cyber Security is modernizing security programs and improving user experiences for hybrid work by delivering the leading secure enterprise browser. Built on Chromium, Talon’s secure enterprise browser provides customers with the consistent user experiences, deep security visibility, and control over SaaS and web applications needed to simplify security for the future of work. Talon was named the Most Innovative Startup of 2022 at the prestigious RSA Conference Innovation Sandbox Contest. For more information, visit Talon at talon-sec.com, or connect on LinkedIn and Twitter.

.@TalonCyber Unveils Research on How Third-Party Workers Contribute to Enterprise Risk

Contacts

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.