Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

It’s not all about the C-suite: How to digitally protect employees

By Kailash Ambwani
meeting-freepik1170.jpg
December 16, 2021

Ransomware attacks and data breaches have taken over the news cycle recently, putting executives and the C-suite in the spotlight as primary targets and victims. As a CEO, it’s important to understand that all too often these cyber attacks are the direct result of corporate credential exposures of lower-level employees. For example, the Colonial Pipeline was breached using an exposed employee credential, not that of an executive. Nevertheless, nearly all industry digital protection services are designed to monitor only a select number of high-profile company employees, forcing security teams to choose which few individuals to safeguard.

It can be easy to forget the consequences that come with living and working in a highly digitalized world — meaning that risks increase as more and more employees engage with an interconnected suite of digital tools and services in today’s distributed virtual workplace. And with cyber threats continuing to grow and evolve, we as CEOs must ask ourselves, why isn’t there the same level of digital protection for employees below executives or the C-suite if they also have access to critical systems and sensitive data?

The title of this article may seem to suggest that executives are no longer highly vulnerable targets for threat actors, but that is far from the case. The personal data and corporate credentials of executives continues to proliferate in the breach economy, making them high-value targets executives in the breach economy. A 2021 Identity Breach Report from my company, Constella Intelligence, found that over 40% of executives from a sample of Fortune 500 companies in the energy and telecommunications sectors were exposed in a breach over the last five years and out of a sample of 55 Fortune 500 energy executives, nearly 1/4 have had their passwords exposed. 

Digital risk protection for executives should still be a top priority for your company. However, if you are going to invest in executive protection to prevent data loss and reputational or financial harm, then it would only make sense to also consider investing in employee protections for those who also have access to critical systems and sensitive data. Employees in areas such as IT, HR, and finance must be on your radar as potential targets for cyber threat actors seeking to inflict damage on your organization, people, and brand. 

According to the IBM Cost of a Data Breach Report 2021, compromised credentials are the most common initial attack vector for data breaches. And breaches caused by compromised credentials also have the longest lifespan of any initial attack vector, taking 341 days to discover and contain, with an average cost of $4.4 million. Once cybercriminals have access to a corporate email, they can leverage it to launch an attack.

Constella’s 2021 Identity Breach Report also found that nearly 60% of the data breaches analyzed exposed some form of personally identifiable information (PII), and 72% of these breaches included passwords. As a CEO, this is frightening. Knowing that breaches regularly occur and employees who are not at the executive level are frequently targeted makes it inexcusable for a company to forego digital risk protections for employees with privileged access to the corporate digital network. 

It is the job of executives to help their companies create a safe environment for their employees and for their business to flourish, and the next landscape to address is digital risk. The continued prevalence of remote work has made it critically important to protect employees below the level of the C-suite, as exposed records present a serious threat. Employees are accessing corporate accounts on personal devices daily, and this flexibility has become commonplace in the new hybrid work model. However, with new workforce trends come new risks. 

I believe that most executives understand that this digital ecosystem of hybrid, distributed workforces and increased remote solutions creates vulnerabilities for their companies but simply aren’t sure how to address the risks. It’s also possible that leaders fear venturing into the unknown world of cybersecurity with complicated algorithms and high-tech processes and are more comfortable leaving the problem to eventually be solved by the security team. After all, they would alert the C-suite if there was a threat to systems and data due to lack of employee protections, right? 

As a member of the cybersecurity community and a CEO, I urge my fellow corporate executives to speak with their security teams and ask important questions about employee protection against external digital risks, threat actors, and exposed corporate credentials circulating on the surface, deep, and dark web.

Now more than ever, discussions must be had on digital and cyber protections for employees, not just executives and the C-suite.

KEYWORDS: c-suite cyber security data breach risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kailash Ambwani is the CEO of Constella Intelligence. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • identity-freepik1170x658v470.jpg

    Identity security is a priority for IT security teams, but not understood by the C-suite

    See More
  • workplace meeting

    It Starts With You: How to Mitigate Risks From the C-Suite

    See More
  • active-directory-freepik5567.jpg

    How to convince the C-suite to buy in to active directory security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing