Almost 40% Of Businesses Have Sacked Staff Due To A Security Breach

Almost 40% of businesses have sacked staff due to a breach of company security policy since the start of the Covid-19 outbreak

Get Our Activist Investing Case Study!

Get the entire 10-part series on our in-depth study on activist investing in PDF. Save it to your desktop, read it on your tablet, or print it out to read anywhere! Sign up below!

Q2 2020 hedge fund letters, conferences and more

Staff Members Dismissed Due To Security Breach

LONDON, 18 August 2020 – 39 per cent of UK business decision makers have admitted to dismissing staff members due to a breach of company cyber security policy since the start of the Covid-19 outbreak, according to new research from Centrify, a leading provider of Identity-Centric privileged access management (PAM) solutions.

Michael Mauboussin: Here’s what active managers can do

michael mauboussin, Credit Suisse, valuation and portfolio positioning, capital markets theory, competitive strategy analysis, decision making, skill versus luck, value investing, Legg Mason, The Success Equation, Think Twice: Harnessing the Power of Counterintuition, analysts, behavioral finance, More Than You Know: Finding Financial Wisdom in Unconventional Places, academics , valuewalkThe debate over active versus passive management continues as trends show the ongoing shift from active into passive funds. Q2 2020 hedge fund letters, conferences and more At the Morningstar Investment Conference, Michael Mauboussin of Counterpoint Global argued that the rise of index funds has made it more difficult to be an active manager. Drawing Read More


The survey of 200 UK business decision makers, conducted by independent polling agency Censuswide, also revealed that almost two-thirds (65 per cent) of companies have made substantial changes to their cyber security policy in response to Covid-19 and100 per cent remote working. Despite this, 58 per cent agreed that employees are more likely to try and circumvent company security practices when working from home – indicating a fundamental flaw in the execution of security measures in a remote-working model.

In an effort to combat poor security practice from employees, 57 per cent of business decision makers revealed that they are currently implementing more measures to securely authenticate employees. Such measures include biometric data checks, such as fingerprint and facial recognition technology, and other multi-factor authentication steps when gaining access to certain applications, files and accounts.

Also, more than half (55 per cent) of businesses already have, or plan to formally ban staff members from using personal devices to work from home.

Remote Work Increasing Security Risks

Andy Heather, VP, Centrify, comments:

“With more people than ever working from home and left to their own devices, it’s inevitable that some will find security work arounds, such as using personal laptops and not changing passwords, in order to maximise productivity. It’s also possible that the changes in security procedures are not being communicated well to employees, and many are practising unsafe internet usage without even realising.

The reality is the weakest link in any organisation continues to be the human element. Combatting this issue starts from the top. CIOs and business decision makers must implement strict and transparent, cloud enabled and identity-centric security solutions. This will allow companies to quickly and safely deploy scalable security privileged access management measures, which make it impossible for an employee to access company networks, applications and data, unless they are following correct procedures.”

Centrify Identity-Centric PAM is designed to handle requesters that are not only human but also machines, services, and APIs. For increased assurance, best practices now recommend strongly authenticated individual identities – not shared accounts – where least privilege can be applied. All controls must be dynamic and risk-aware, which requires modern machine learning and user behaviour analytics. PAM must integrate and interoperate with a much broader ecosystem including the cloud providers, DevSecOps tools, containers, microservices, and more.

For more information about Centrify’s solutions, visit https://www.centrify.com/privileged-access-management/.


About Centrify

Centrify is redefining the legacy approach to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access environment. Centrify centralizes and orchestrates fragmented identities, improves audit and compliance visibility, and reduces risk, complexity, and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.

©Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.