sb-au logo
Story image

Enterprise cloud deployments being exploited by cybercriminals

20 Feb 2019

A new report from Check Point Software Technologies has revealed there is a lot of uncertainty surrounding cloud security breaches - which are on the rise.

According to the cybersecurity specialist’s third instalment of its 2019 Security Report, cybercriminals are increasingly targeting the weakest and least protected points in an organisation’s IT infrastructure - the public cloud and mobile deployments.

The report reveals the key cyber-attack trends used by criminals to target enterprise cloud and mobile estates during 2018. It also reveals enterprise IT and security teams’ key security concerns about these deployments.

It shows there is certainly cause for alarm, as almost one in five organisations around the world had a cloud security incident in the past year with the most common incident types being data leaks/breaches, account hijacks, and malware infections.

IT professionals of the report were then asked to list what they perceive to be the top four public cloud security threats, with misconfiguration of cloud platforms leading to data loss or breaches being the most prominent with 62 percent, followed by unauthorised access to cloud resources with 55 percent, insecure interfaces and APIS with 50 percent, and finally hijacking of accounts or data traffic 47 percent.

However, by no means does this show that IT professionals are aware of the swelling issue. A staggering 30 percent still believe security is the responsibility of the cloud service provider. Check Point says this concering finding negates recommendations that cloud security should follow the mutual responsibility model, in which security is shared by both the cloud provider and the customer.

According to Check Point, a single misconfigured cloud workload or storage instance is all it takes to open the gates to a potential attack with huge repercussions.

Hardware chip vulnerabilities that can be found in the systems that make up cloud infrastructure - like Meltdown, Spectre, and Foreshadow - are also exposing data to cybercriminals.

Another possible driver of this targeting of cloud infrastructure is because revenue from other instances like cryptojacking and ransomware continue to reduce.

“The third instalment of our 2019 Security Report shows just how vulnerable organisations are to attacks targeting their cloud and mobile estates because there is a lack of awareness of the threats they face and how to mitigate them,” says Check Point Software Technologies Cloud Product Line head Zohar Alon.

As nearly 20 percent of organisations have experienced a cloud incident in the past year, it’s clear that criminals are looking to exploit these security gaps.”

On the mobile deployment side, the majority (59) percent of IT professionals are not using mobile threat defences capable of detecting leading threats including mobile malware, fake or malicious apps, man-in-the-middle attacks and system vulnerabilities.

This is perhaps because just 9 percent consider threats on mobile devices a significant security risk, despite Check Point asserting malware can propagate from unprotected mobile devices to organisations’ cloud- or on-premise networks, exploiting this weak link in enterprise security defences.

Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More