More than Half of U.S. Companies Hit with Privileged Credential Theft, Insider Threats in Last Year
ThycoticCentrify research shows impressive adoption of Zero Trust principles in response to rising cyberattacks on critical systems and data
May 19, 2021
Santa Clara, Calif. and Washington D.C. ― May 19, 2021 ―, a leading provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, today announced new research that reveals more than half of organizations have been grappling with the theft of legitimate, privileged credentials (53%) and insider threat attacks (52%) in the last 12 months. In 85% of the privileged credential theft instances, cybercriminals were able to access critical systems and/or data. In addition, two-thirds (66%) of insider threats led to abuse of administrative privileges to illegitimately access critical systems and/or data.
The research, commissioned by ThycoticCentrify, surveyed 150 IT decision makers across the U.S. on the most common privileged access risks and Zero Trust adoption trends. In addition to external and malicious insider threat attacks, the study found that nearly half (48%) of organizations experienced a data breach as a result of giving an employee or contractor too much access in the last year.
Based on these compromise patterns, it is not surprising that 65% of respondent companies saw their IT administrators targeted most frequently by cybercriminals, followed by engineers and developers (21%) and the C-suite (19%).
“IT administrators hold the keys to the most sensitive and mission-critical parts of the kingdom, and both internal and external attackers are taking full advantage,” said David McNeely, chief technology officer at ThycoticCentrify. “Abusing access to these systems can lead to full-scale breaches that grab headlines and impact trust in the organization. While there is no single solution that can eliminate every one of these risk factors, adopting Zero Trust principles is an excellent start.”
mandates a “never trust, always verify, enforce least privilege” approach to cybersecurity, whether the threat is coming from inside or outside the network. Promisingly, nearly all respondents are somewhat familiar (33%) or very familiar (62%) with the term, especially as it relates to identity and access management (IAM).
The survey found an impressive 77% currently utilize a Zero Trust approach in their cybersecurity strategy, possibly attributed to the frequent attacks on IT. In fact, 42% listed reducing cyberthreats as the top motivator for adoption, followed by better compliance (30%), reducing privileged access abuse, and inspecting and logging traffic/access requests (both 14%). Common barriers for adoption include complicated or inadequate security solutions (57%), fear of disrupting user experience (43%), budget (38%), and staffing resources (30%).
“There are many on-ramps to Zero Trust. But with privileged identities playing such a key role in most data breaches, it makes sense to begin that journey with a modern PAM solution built around a least privilege model of access control,” said Tony Goulding, cybersecurity evangelist at ThycoticCentrify.
A large majority of respondents (83%) have incorporated a privileged access management (PAM) tool into their security infrastructure, and 89% of those PAM services support a Zero Trust approach to verify privileged users.
Complete results of the survey are available at. For more information about ThycoticCentrify’s solutions for managing privileged access, visit .
*The survey of 150 IT decision makers across the U.S. was conducted by CensusWide in May 2021.
ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify’s industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations’ data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
©Thycotic Software, LLC and Centrify Corporation 2021. ®Centrify and ®Thycotic are registered trademarks of Centrify Corporation and Thycotic Software, LLC, respectively, in the United States and other countries.