Cloud Risks Are Real

The cloud wars are over, and of course the cloud won. We don’t just deal with the cloud; when it comes to IT, we pretty much live in the cloud. The most obvious result is enormous power at our fingertips — even when our fingers are on the go.

The power of the cloud also means that cloud risks are all around us. Since the cloud is everywhere, we may not even think of those risks as cloud-related — but they are, which means basic cloud security education is essential.

BYOCA: Bring-Your-Own-Cloud-App and Other Blunders

Remember when bring-your-own-device (BYOD) first became a big security concern? It still is, by the way, and it’s easy to forget that those mobile devices are used almost entirely for mobile access to — wait for it — the cloud.

It’s not just mobile, either. As Dennis McCafferty pointed out at CIO Insight, laptops are the primary way business users access the cloud.

The basic fact of cloud risks and cloud security is that it is a shared responsibility. According to Yotam Gutman at Infosec Island, the vendor, be it the cloud provider or a cloud resource provider, is typically responsible for offering a secured service. The client — you or your employee — is responsible for using it securely.

Cloud services vendors can and do slip up, but the real challenge is on the client end. Mistakes are legion. Infosec Island reported that one-third of business users surveyed have downloaded work-related apps without telling IT. Most probably never thought twice about it, especially if they were using a company-provided device.

The cloud also supports creative new versions of old-fashioned security blunders. One-quarter of respondents in the “(Still) Careless Users in the Cloud” survey stored passwords in documents that weren’t password-protected. When left in an unprotected document, that password is conveniently available to the cybercriminal working from anywhere around the world. Additionally, anyone could walk into an office and see the 20 percent of passwords written on a sticky note, according to the report. These poor practices could ultimately result in damaging breaches for an organization.

Security Education Should Not Be a Teachable Moment

More often than not, basic cloud security mistakes are made by people who have no idea that they are doing something risky. No warning sign comes up; employees only see the cloud as another resource that comes up on their monitor — not the massive risk it actually is. The time to discover the need for basic cloud security education is not when a breach occurs and company data spills all over the Internet.

Yes, a growing range of security solutions are available for protecting against specific cloud risks. But the most critical line of protection remains the human user. Organizations need to protect themselves and their people from the hazards of the cloud by educating them in security awareness for the cloud era.

Learn more about Cloud Security

More from Cloud Security

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe. With vulnerabilities on the rise, the catastrophic impact of cloud breaches has made it clear that proper cloud security is of the utmost importance. And…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…

How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a nice feature because it allows developers and administrators to manage GCP resources without having to install or keep any software locally on their system. From…