A new study from Verizon claims insiders are not the main threat to business networks, revealing that 73 percent of the breaches reported as part of its 'Data Breach Investigations Report' came from external agents.
Verizon's 2008 'Data Breach Investigations Report', which looked at 500 breach incidents over the last four years, contradicts the growing orthodoxy that insiders represent the most serious threat to network security at most organisations.
Just 18 percent of breaches resulted from the actions of insiders, according to Verizon, with business partners blamed for 39 percent - the percentages exceed 100 percent due to the fact that some involve multiple breaches, with varying degrees of internal or external involvement.
"The relative infrequency of data breaches attributed to insiders may be surprising to some. It is widely believed and commonly reported that insider incidents outnumber those caused by other sources," the report states.
"Our caseload showed otherwise for incidents resulting in data compromise. This finding, of course, should be considered in light of the fact that insiders are adept at keeping their activities secret."
59 percent of breaches were attributed to hacking, 31 percent involved malicious code, 22 percent exploited vulnerability, with 15 percent involving a physical threat. 62 percent - the overwhelming majority - had human error at their root.
Nevertheless, the report cautions from using the statistics to dismiss the internal threat altogether. When internal or partner security compromises happen, they tend to involve greater amounts of data. Where data loss was involved, external security breaches resulted in a media of 30,000 records being compromised, some way behind the figure for internal breaches, at 375,000.
When internal hacks occur, they tend to be nastier, with 50 percent blamed on IT staff themselves, way ahead of other types of employee.
The report concludes that honest network administrators are obsessed with outdated ideas of perimeter security. Had data security been looked at within the network, almost nine out of 10 data breaches could have been avoided.
"While a strong network perimeter is important, it cannot be the only or even the main layer of protection around sensitive information assets," the authors say.