VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More

Nearly 80% of organizations have not implemented — or have only partially implemented — a privileged access management solution.

Figure 1. Privileged Access Management Practices Implemented by % of Respondents. 42% account for logging of privileged account use. 40% account for audits of privileged accounts. 39% account for monitor for anomalous behavior. 37% account for multi-factor authentication for privileged access. 34% account for tiered model to prevent privilege escalation. 29% account for dedicated workstations for administrative actions. 23% account for automated PAM solutions.

As organizations become increasingly internet-reliant and networked technical environments, they are faced with defending against evolving ransomware attacks.

Early ransomware attacks primarily targeted organizational data; however, attacks are progressively overtaking systems and networks, which is especially troublesome for the stability of critical infrastructure.


AI Unleashed

An exclusive invite-only evening of insights and networking, designed for senior enterprise executives overseeing data stacks and strategies.


Learn More

Using data from 100 organizations across multiple critical infrastructure sectors, Axio researchers identified seven key areas where organizations are deficient in implementing and sustaining basic cybersecurity measures. Overwhelmingly, the most concerning finding was a pervasive lack of basic controls over privileged credentials and access — nearly 80% of organizations have not implemented or have only partially implemented privileged access management.

While an element of ransomware exposure is due to factors outside of an organization’s direct control, from a lack of sufficient technologies to employees falling victim to phishing schemes, this report reveals shockingly common failures of basic cybersecurity practices and indicates that highly impactful improvements in ransomware protection may be directly obtained by improving basic cyber hygiene.

Read the full report by Axio.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.