Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ericsson Breach Exposes Data of 15k Employees and Customers

March 11, 2026

Only 24% Of organizations Test Identity Recovery Every Six Months

March 10, 2026

SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

March 10, 2026
Facebook X (Twitter) Instagram
Wednesday, March 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Only 24% Of organizations Test Identity Recovery Every Six Months
News

Only 24% Of organizations Test Identity Recovery Every Six Months

Team-CWDBy Team-CWDMarch 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Just 24% of organizations test their identity disaster recovery plans every six months, according to new research which examined how businesses prepare for identity-focused cyber-attacks.

The findings suggested that despite rising investment in identity threat detection and response (ITDR), many organizations remain poorly prepared to restore critical authentication systems after a breach.

The data comes from Quest Software’s latest report, a global survey of 650 IT and security practitioners and executives. The study found that many companies place heavy emphasis on preventative controls and threat detection while neglecting response and recovery readiness.

Identity infrastructure now sits at the centre of modern IT environments, connecting users, applications, automation tools and cloud services. When attackers compromise these systems, they can quickly gain widespread access across networks, data and administrative controls.

Survey results suggested many organizations overestimate their security posture because alerts and preventative defences appear to be working. However, when identity protections fail, the speed and reliability of recovery often determine how severe the business impact becomes.

Recovery Preparedness Remains Limited

Testing identity recovery procedures remains inconsistent across many organizations, despite widespread guidance recommending regular exercises. Only a minority validate their recovery plans at least twice a year.

Survey respondents reported the following recovery testing schedules:

  • 24% test identity disaster recovery every 6 months

  • 44% conduct tests once a year

  • 8% test every 2 years

  • 24% never test their recovery plans

According to Quest Software’s report, organizations that regularly rehearse recovery tend to experience shorter outages and lower disruption during identity-related incidents.

Read more on identity security: Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials

Identity Security Complexity Continues to Grow

Identity has become one of the most common entry points for cyber-attacks as organizations adopt hybrid infrastructure and cloud platforms. Systems such as Active Directory and cloud identity services manage authentication across environments, creating a critical control point for attackers.

The survey highlights particular concern around non-human identities, including service accounts and automated credentials. These identities often grow faster than governance processes can track them, leaving organizations unsure of the full scope of their identity attack surface.

More broadly, identity security challenges appear to be systemic rather than isolated to specific technologies. Respondents identified several areas that are difficult to monitor or secure:

  • Non-human identities (51%)

  • Third-party or partner accounts (49%)

  • Service accounts and automation credentials (47%)

  • On-premises identity systems and legacy environments (45%)

  • Privileged accounts and critical Tier 0 assets (40%)

  • Cloud identities (33%)

The research also found that nearly 80% of organizations remain vulnerable to identity-related threats due to complexity and insufficient tools.

AI Adoption And ITDR Growth

Security teams are increasingly turning to automation to manage the growing volume of identity alerts and activity. The study found that 79% of respondents believe artificial intelligence can improve ITDR effectiveness by reducing alert fatigue and analysing signals across multiple identity platforms.

At the same time, ITDR adoption continues to increase. The report found that 57% of organizations now operate an ITDR programme, up from 48% the previous year, while 92% of organizations with an existing programme say they have achieved at least partial benefits.

However, the report concluded that many ITDR initiatives still focus heavily on detection tools rather than a full lifecycle approach that includes identification, protection, response and recovery. Without stronger recovery testing and better visibility into identities, organizations risk remaining vulnerable when identity-driven attacks succeed.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
Next Article Ericsson Breach Exposes Data of 15k Employees and Customers
Team-CWD
  • Website

Related Posts

News

SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

March 10, 2026
News

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

March 10, 2026
News

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Your information is on the dark web. What happens next?

January 13, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.