Cloud vulnerabilities grow as use increases

New research suggests that a multicloud future will require new innovations in cloud security as organisations favour many providers, increasing the risk of sensitive data disclosures

The amount of data we generate each and every day is staggering. Currently, we create 2.5 quintillion bytes of data, but the pace is quickening as the internet of things (IoT) grows more prominent in our daily lives.

Google now processes 3.5 billion searches a day or 40,000 per second. Every minute, users watch over 4 billion YouTube videos. 12.5 million photographs are uploaded to Facebook every hour: that’s 300 million each day. 

All that data has to go somewhere. Physical storage is no longer viable, so we now rely on other methods to handle the vast majority of our data storage needs.

What exactly is cloud storage?

It can be a baffling concept for many. The intangibility leaves us a little perplexed by what isn’t but theoretically is there. 

Are we in the cloud now? Where is it? What does it look like? Well, it’s in our pockets, on our desktops, around our city streets and everywhere else you can imagine, but we can’t see it: we can only visualise it with software.

In basic terms, cloud storage is a computing model where data is remotely stored. It is accessed through the internet, as most things are in our hyper-connected world, and is often managed by cloud service providers, often huge tech companies which offer Infrastructure-as-a-Service (IaaS), like AWS, Google or IBM.

As more and more organisations rely on the cloud to store data, it has been proven that vulnerabilities grow. The sheer volume of information makes those organisations with less stringent container security vulnerable to attacks. 

A number of high-profile sensitive data disclosures have come to light this year. The most recent of which, a hack on Capital One which exposed the personal information of over 100 million people, acts as a case in point. Details continue to emerge of another 30 companies who have fallen prey to the hacker responsible for the Capital One breach, showing severe vulnerabilities in not just a few, but many organisations.

However, research does show that the service is slowly improving, despite what these high-profile breaches might suggest. Nevertheless, attacks are still happening. As the reliance on cloud services grows, security experts must innovate in order to keep all that information safe.

Cloud security is vital
Security experts must innovate to keep our data safe


What does the research tell us?

In a SANS 2019 survey, security expert Dave Shackleford said: “We saw a significant increase in unauthorized access by outsiders into cloud environments or to cloud assets; this occurred at 19% of organizations in the 2019 survey.”

This could be due in part to multicloud systems, which Shackleford said are increasing in prominence. Businesses are using two to three providers for their cloud and data needs, offering intruders more entry points than in previous years.

Another consideration is the type of information we store on the cloud. With so many data breaches being made, less and less personal information and employee records are being stored in the cloud. This year has seen a significant drop in the use of the cloud for sensitive data. 

Business intelligence (48%) tops the list of those surveyed, the same percentage as intellectual property, closely followed by customer personal information (43%). But way down the list is customer payment information (17.6%), customer financial information (25.6%) and employee records (37.7%).

Cloud sensitive data storage
Sensitive data in the cloud / Credit: SANS 2019 Cloud Security Survey


“Overall, the general trend is very similar to what we saw previously,” says Shackleford. “Roughly one-half to one-third of organizations are willing to put a variety of sensitive data types in the cloud.” 

GDPR requirements also appear to be impacting upon organisations’ storage strategies. The regulations have meant that they need to be sure that their service providers can sufficiently handle their privacy needs for certain types of data.

As it evolves, so too must the security to mitigate the threat of sensitive data breaches leading to irreparable damage to an organisation’s reputation and bottom line. 

Understanding how to effectively use it is vital for each organisation, as is knowing the best security strategy, lest they fall prey to breaches and hacks the likes of which we’re now seeing at an unprecedented rate.

Luke Conrad

Technology & Marketing Enthusiast

Is It Time for a VMware Alternative?

Wind River • 22nd May 2025

Companies have options when it comes to replacing VMware as their cloud platform, to address rising costs, support concerns, and a shrinking partner ecosystem. If you are ready to contemplate a different vendor, here are five reasons why Wind River Cloud Platform should be on your short list of VMware alternatives.

AI Leads as VivaTech Unveils Top 100 Startups

Viva Technology • 14th May 2025

Viva Technology has unveiled the first edition of its “Top 100 Rising European Startups for 2025,” spotlighting the most promising young companies shaping Europe’s tech future. Germany, France, and the UK lead the ranking, which highlights high-growth startups across 13 countries. Artificial intelligence dominates the list, with 15 companies spanning AI agents, models, and infrastructure....

Birmingham Unveils the UK’s Best Emerging HealthTech Advances

Kosta Mavroulakis • 03rd April 2025

The National HealthTech Series hosted its latest event in Birmingham this month, showcasing innovative startups driving advanced health technology, including AI-assisted diagnostics, wearable devices and revolutionary educational tools for healthcare professionals. Health stakeholders drawn from the NHS, universities, industry and front-line patient care met with new and emerging businesses to define the future trajectory of...

Why DEIB is Imperative to Tech’s Future

Hadas Almog from AppsFlyer • 17th March 2025

We’ve been seeing Diversity, Equity, Inclusion, and Belonging (DEIB) initiatives being cut time and time again throughout the tech industry. DEIB dedicated roles have been eliminated, employee resource groups have lost funding, and initiatives once considered crucial have been deprioritised in favour of “more immediate business needs.” The justification for these cuts is often the...

The need to eradicate platform dependence

Sue Azari • 10th March 2025

The advertising industry is undergoing a seismic shift. Connected TV (CTV), Retail Media Networks (RMNs), and omnichannel strategies are rapidly redefining how brands engage with consumers. As digital privacy regulations evolve and platform dynamics shift, advertisers must recognise a fundamental truth. You cannot build a sustainable business on borrowed ground. The recent uncertainty surrounding TikTok...