Cloud vulnerabilities grow as use increases

New research suggests that a multicloud future will require new innovations in cloud security as organisations favour many providers, increasing the risk of sensitive data disclosures

The amount of data we generate each and every day is staggering. Currently, we create 2.5 quintillion bytes of data, but the pace is quickening as the internet of things (IoT) grows more prominent in our daily lives.

Google now processes 3.5 billion searches a day or 40,000 per second. Every minute, users watch over 4 billion YouTube videos. 12.5 million photographs are uploaded to Facebook every hour: that’s 300 million each day. 

All that data has to go somewhere. Physical storage is no longer viable, so we now rely on other methods to handle the vast majority of our data storage needs.

What exactly is cloud storage?

It can be a baffling concept for many. The intangibility leaves us a little perplexed by what isn’t but theoretically is there. 

Are we in the cloud now? Where is it? What does it look like? Well, it’s in our pockets, on our desktops, around our city streets and everywhere else you can imagine, but we can’t see it: we can only visualise it with software.

In basic terms, cloud storage is a computing model where data is remotely stored. It is accessed through the internet, as most things are in our hyper-connected world, and is often managed by cloud service providers, often huge tech companies which offer Infrastructure-as-a-Service (IaaS), like AWS, Google or IBM.

As more and more organisations rely on the cloud to store data, it has been proven that vulnerabilities grow. The sheer volume of information makes those organisations with less stringent container security vulnerable to attacks. 

A number of high-profile sensitive data disclosures have come to light this year. The most recent of which, a hack on Capital One which exposed the personal information of over 100 million people, acts as a case in point. Details continue to emerge of another 30 companies who have fallen prey to the hacker responsible for the Capital One breach, showing severe vulnerabilities in not just a few, but many organisations.

However, research does show that the service is slowly improving, despite what these high-profile breaches might suggest. Nevertheless, attacks are still happening. As the reliance on cloud services grows, security experts must innovate in order to keep all that information safe.

Cloud security is vital
Security experts must innovate to keep our data safe


What does the research tell us?

In a SANS 2019 survey, security expert Dave Shackleford said: “We saw a significant increase in unauthorized access by outsiders into cloud environments or to cloud assets; this occurred at 19% of organizations in the 2019 survey.”

This could be due in part to multicloud systems, which Shackleford said are increasing in prominence. Businesses are using two to three providers for their cloud and data needs, offering intruders more entry points than in previous years.

Another consideration is the type of information we store on the cloud. With so many data breaches being made, less and less personal information and employee records are being stored in the cloud. This year has seen a significant drop in the use of the cloud for sensitive data. 

Business intelligence (48%) tops the list of those surveyed, the same percentage as intellectual property, closely followed by customer personal information (43%). But way down the list is customer payment information (17.6%), customer financial information (25.6%) and employee records (37.7%).

Cloud sensitive data storage
Sensitive data in the cloud / Credit: SANS 2019 Cloud Security Survey


“Overall, the general trend is very similar to what we saw previously,” says Shackleford. “Roughly one-half to one-third of organizations are willing to put a variety of sensitive data types in the cloud.” 

GDPR requirements also appear to be impacting upon organisations’ storage strategies. The regulations have meant that they need to be sure that their service providers can sufficiently handle their privacy needs for certain types of data.

As it evolves, so too must the security to mitigate the threat of sensitive data breaches leading to irreparable damage to an organisation’s reputation and bottom line. 

Understanding how to effectively use it is vital for each organisation, as is knowing the best security strategy, lest they fall prey to breaches and hacks the likes of which we’re now seeing at an unprecedented rate.

Luke Conrad

Technology & Marketing Enthusiast

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...