Proofpoint: cloud account compromises cost organisations over US$6mn annually

An image of Proofpoint, Cloud, Proofpoint: cloud account compromises cost organisations over US$6mn annually

Over two-thirds of surveyed IT professionals believe cloud account takeovers are a significant risk to their organisations.

Proofpoint, a leading cybersecurity and compliance company, and Ponemon Institute, a top IT security research organisation, has released the results of a new study on “The Cost of Cloud Compromise and Shadow IT.” The average cost of cloud account compromises reached US$6.2mn over a 12-month period, according to over 600 IT and IT security professionals in the US. In addition, 68% of these survey respondents believe cloud account takeovers present a significant security risk to their organisations, with more than half indicating the frequency and severity of cloud account compromises has increased over the last 12 months.

“This research illustrates that leaving SaaS security in the hands of end-users or lines of business can be quite costly,”said Dr. Larry Ponemon, chairman and founder of Ponemon Institute.“Cloud account compromises and sensitive information loss can disrupt business, damage brand reputation, and cost organizations millions annually.”

Only 44% of survey respondents believe their organisations have established clearly defined roles and accountability for safeguarding confidential or sensitive information in the cloud. Risks are also magnified as fewer than 40% of respondents say their organizations are vigilant in conducting cloud app assessments before deployment.

Additional key survey findings include:

  • Cloud account compromises are costly incidents and present a significant security risk. According to 86% of respondents, the annual cost of cloud account compromises is over $500,000. Survey respondents also reported 64 cloud account compromises per year on average, with 30% exposing sensitive data. Nearly 60 percent of respondents indicated Microsoft 365 and Google Workspace accounts are heavily targeted by brute force and phishing-based cloud attacks. Overall, over 50% of respondents say phishing is the most frequent method attackers use to acquire legitimate cloud credentials.
  • Shadow IT is creating substantial risks for organisations. Seventy-five percent of respondents say their use of cloud apps and services without the approval of IT is a serious security risk. Additional practices also increased risks, including moving to the cloud and mobile workforce (72%) and cloud-based collaboration and messaging tools for sharing sensitive or confidential files (70%).
  • Strong authentication and adaptive access controls are essential in securing admission to cloud resources. Over 70% of respondents supported multiple identity federation standards, including SAML, and controlling strong authentication before accessing data and applications in the cloud. 61% agreed adaptive access controls to protect users most at risk are essential.

READ MORE:

“SaaS security simply cannot be an afterthought given the high cost of cloud account compromise and today’s heightened hybrid working environment. The move to the cloud and increased collaboration requires a people-centric security strategy backed by a cloud access security broker (CASB) solution that is integrated with a larger cloud, email, and endpoint security portfolio,” said Tim Choi, vice president of Product Marketing for Proofpoint. “Such an approach effectively addresses concerns like cloud account compromise, unauthorized access to cloud data, and cloud application governance. Organizations need clearly defined roles, established accountability, and a CASB solution that can be operationalized in hours—not weeks.”

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

An image of Proofpoint, Cloud, Proofpoint: cloud account compromises cost organisations over US$6mn annually

Luke Conrad

Technology & Marketing Enthusiast

What will gaming look like when it goes into the...

James Ponter • 08th July 2022

One of the biggest hurdles in cloud gaming is the reluctance of ‘gamers’ to adopt the system, but developers and tech giants aren’t slowing down their move to the cloud. So, what is cloud gaming? How can we expect the landscape to look in a few years? And most importantly, what are the limitations? By...

The cost of living crisis.

TBT Newsroom • 29th June 2022

What Communication Service Providers can do to help their customers cope with the cost-of-living crisis. We’re all familiar with the rip roaring marketing slogans of our U.K. Communication Service Providers – ‘together we can’, ‘The future is bright’, ‘It’s all about you’…but sadly, these no longer appear to ring true for the millions of consumers...

Thriving In The 5G Era.

TBT Newsroom • 26th June 2022

As consumer demand rises, and network availability expands, 5G is becoming more viable for widespread use — by 2027 it’s expected to cover 75 per cent of the world’s population. However, it’s still no secret that 5G uptake is dawdling and many enterprises still aren’t enjoying its benefits.

Why Low-Latency Is So Important.

TBT Newsroom • 23rd June 2022

Consumer interest in 5G technology has been fueled by the arrival of glamorous, speedy handsets such as Apple’s iPhone 12, with 5G networks now rolled out to many towns and cities across the country.