Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Top 5 Cybersecurity Risks with Cloud Migration
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Top 5 Cybersecurity Risks with Cloud Migration

6 years ago Tripwire Guest Authors
Top 5 Cybersecurity Risks with Cloud Migration

The demand for cloud computing has skyrocketed in recent years. Lower costs, a faster time to market, increased employee productivity, scalability, and flexibility are some of the beneficial factors motivating organizations to move to the cloud. It’s not likely that organizations will slow down with their migration plans, either. According to market estimates, the global cloud computing market size is projected to grow from USD 272.0 billion in 2018 to USD 623.3 billion by 2023 at a CAGR of 18.0%.

Simultaneously, the coronavirus pandemic has led to a sudden boom in the cloud industry as companies have to increasingly rely on remote working.

The transition to the cloud has brought new security challenges, however. According to IDC, around 30% of surveyed companies purchased 30+ types of cloud services from 16 different vendors in 2019 alone. This makes these organizations vulnerable to cyberattacks; cybercriminals are preying upon these entities by abusing configuration errors as well as vulnerabilities within the applications, which often remained undetected by the organization due to the skill gap.

Abhijit Chakravorty, cloud security competency leader at IBM Security Services, summarized the impact of the cloud this way:

The cloud holds enormous potential for business efficiency and innovation, but it can also create a ‘wild west’ of broader and more distributed environments for organizations to manage and secure.

Here are some of the top cloud security risks that organizations should keep in mind going forward.

Exploiting Cloud Apps

According to the recent case study by IBM X-Force IRIS, cloud-based applications are the most common path for cybercriminals for compromising cloud environments. They accounted for 45% of cloud-related cyber threats in IBM’s study.

Ransomware

Ransomware is one of the biggest cyber threats confronting the cloud industry. Ransomware was deployed three times more than any other type of malware in cloud environments, found IBM, followed by crypto miners and botnet malware.

Data Loss

Companies are increasingly storing sensitive data in the cloud. Around 21% of files uploaded to cloud-based file-sharing services contained sensitive data including intellectual property, according to IBM.

As such, cybercriminals can gain access to intellectual property or other personal files in the event of security breaches involving the cloud.

Data loss is one of the cloud security risks that are hard to predict and even harder to handle. Data theft was the most common threat activity observed by IBM in breached cloud environments outside of malware deployment over the last year.

Malware

Malware makes its way into the cloud environment in various ways. The most popular method is via phishing emails and by taking advantage of poorly configured storage servers.

As data is constantly traveling to and from the cloud, malware has a vastly increased number of opportunities to attack not only cloud infrastructure but also client infrastructure and devices.

“Based on the trends in our incident response cases, it’s likely that malware cases targeting cloud will continue to expand and evolve as cloud adoption increases,” said Charles DeBeck, IBM X-Force IRIS.

“Malware developers have already begun making malware that disables common cloud security products, and designing malware that takes advantage of the scale and agility offered by the cloud,” he added.

Legal/Compliance Issues

With increasing government regulations pertaining to data protection such as GDPR and HIPAA, staying compliant is becoming more complex.

Owing to the large-scale accessibility of data on the cloud environment, it can be difficult for businesses to keep track of who can access the information.

Companies should always strive to remain compliant with laws and industry regulations to avoid facing hefty fines and reputational damage in the aftermath of a successful security incident.

In Conclusion

Although cloud transition is posing new security challenges, organizations that are able to adopt a mature and streamlined governance model for the cloud can significantly enhance security agility and response capabilities.

The organizations should focus on the following aspects to address security concerns in hybrid, multi-cloud environments:

  • Promote collaborating governance and culture for cloud and security operations
  • Develop a risk-based assessment for developing a roadmap for phasing cloud adoption
  • Adopt strong access management tools and policies for access to cloud resources
  • Ensure right security tools across all cloud and on-premise resources
  • Implement effective security automation

What are you waiting for? Address the security risks to make cloud migration a successful story.


About Author: Anand is a senior content writer at the Veritis Group working on market research, collaterals, whitepapers, technology news &, etc. Reading books, blogging, and social media are other work-related interests among various other skill sets.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Top 5 Cybersecurity Risks with Cloud Migration” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Compliance, Coronavirus, Malware, Phishing, Ransomware, TripWire

Continue Reading

Previous Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover
Next Are You Ready To Automate Your Cloud Account Security?

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

4 hours ago [email protected] (The Hacker News)
  • Data Breach

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

19 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

19 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach

When Cloud Outages Ripple Across the Internet

22 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
  • CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
  • http://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
  • [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT