Cloud vulnerabilities grow as use increases

New research suggests that a multicloud future will require new innovations in cloud security as organisations favour many providers, increasing the risk of sensitive data disclosures

The amount of data we generate each and every day is staggering. Currently, we create 2.5 quintillion bytes of data, but the pace is quickening as the internet of things (IoT) grows more prominent in our daily lives.

Google now processes 3.5 billion searches a day or 40,000 per second. Every minute, users watch over 4 billion YouTube videos. 12.5 million photographs are uploaded to Facebook every hour: that’s 300 million each day. 

All that data has to go somewhere. Physical storage is no longer viable, so we now rely on other methods to handle the vast majority of our data storage needs.

What exactly is cloud storage?

It can be a baffling concept for many. The intangibility leaves us a little perplexed by what isn’t but theoretically is there. 

Are we in the cloud now? Where is it? What does it look like? Well, it’s in our pockets, on our desktops, around our city streets and everywhere else you can imagine, but we can’t see it: we can only visualise it with software.

In basic terms, cloud storage is a computing model where data is remotely stored. It is accessed through the internet, as most things are in our hyper-connected world, and is often managed by cloud service providers, often huge tech companies which offer Infrastructure-as-a-Service (IaaS), like AWS, Google or IBM.

As more and more organisations rely on the cloud to store data, it has been proven that vulnerabilities grow. The sheer volume of information makes those organisations with less stringent container security vulnerable to attacks. 

A number of high-profile sensitive data disclosures have come to light this year. The most recent of which, a hack on Capital One which exposed the personal information of over 100 million people, acts as a case in point. Details continue to emerge of another 30 companies who have fallen prey to the hacker responsible for the Capital One breach, showing severe vulnerabilities in not just a few, but many organisations.

However, research does show that the service is slowly improving, despite what these high-profile breaches might suggest. Nevertheless, attacks are still happening. As the reliance on cloud services grows, security experts must innovate in order to keep all that information safe.

Cloud security is vital
Security experts must innovate to keep our data safe


What does the research tell us?

In a SANS 2019 survey, security expert Dave Shackleford said: “We saw a significant increase in unauthorized access by outsiders into cloud environments or to cloud assets; this occurred at 19% of organizations in the 2019 survey.”

This could be due in part to multicloud systems, which Shackleford said are increasing in prominence. Businesses are using two to three providers for their cloud and data needs, offering intruders more entry points than in previous years.

Another consideration is the type of information we store on the cloud. With so many data breaches being made, less and less personal information and employee records are being stored in the cloud. This year has seen a significant drop in the use of the cloud for sensitive data. 

Business intelligence (48%) tops the list of those surveyed, the same percentage as intellectual property, closely followed by customer personal information (43%). But way down the list is customer payment information (17.6%), customer financial information (25.6%) and employee records (37.7%).

Cloud sensitive data storage
Sensitive data in the cloud / Credit: SANS 2019 Cloud Security Survey


“Overall, the general trend is very similar to what we saw previously,” says Shackleford. “Roughly one-half to one-third of organizations are willing to put a variety of sensitive data types in the cloud.” 

GDPR requirements also appear to be impacting upon organisations’ storage strategies. The regulations have meant that they need to be sure that their service providers can sufficiently handle their privacy needs for certain types of data.

As it evolves, so too must the security to mitigate the threat of sensitive data breaches leading to irreparable damage to an organisation’s reputation and bottom line. 

Understanding how to effectively use it is vital for each organisation, as is knowing the best security strategy, lest they fall prey to breaches and hacks the likes of which we’re now seeing at an unprecedented rate.

Luke Conrad

Technology & Marketing Enthusiast

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...

Enabling “Farm to Fork” efficiency between supermarkets & producers

Neil Baker • 03rd April 2024

Today, consumers across the UK are facing a cost of living crisis. As a result, many retailers and supermarkets are striving to keep their costs down, so that they can avoid passing these onto shoppers. Within this, one area that is increasingly under scrutiny for many organisations surrounds how to improve supply chain efficiency. This...

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!