IT disaster recovery, cloud computing and information security news

Check Point and Cybersecurity Insiders have released the results of a global Cloud Security Report highlighting the challenges faced by enterprise security operations teams in protecting their public cloud data, systems, and services.

While public cloud providers expand their security services to protect their platforms, it is ultimately the customers’ responsibility to secure their data and applications on those platforms. While a majority of organizations said their public cloud instances had not been hacked (54 percent), 25 percent did not know whether they had experienced a cloud breach, while 15 percent confirmed they had experienced a cloud security incident.

Key findings of the 2019 Cloud Security Report include:

  • The top four public cloud vulnerabilities: the leading vulnerabilities cited by respondents were unauthorized cloud access (42 percent), insecure interfaces (42 percent), misconfiguration of the cloud platform (40 percent), and account hijacking (39 percent).
  • The leading operational cloud security headaches:  security teams struggle with a lack of visibility into cloud infrastructure security and compliance (67 percent in total). Setting consistent security policies across cloud and on premise environments and a lack of qualified security staff tie for third place (31 percent each).
  • Legacy security tools are not designed for public clouds:  66 percent of respondents said their traditional security solutions either don’t work at all, or only provide limited functionality in cloud environments.
  • Security challenges inhibit cloud adoption:  the biggest barriers to wider public cloud adoption cited by respondents are data security (29 percent), risk of compromise (28 percent), compliance challenges (26 percent) and a lack of experience and qualified security staff (26 percent).

“The Report’s findings clearly show that enterprise security teams need to urgently reassess their security strategies and address the shortcomings of their legacy security tools to protect their evolving public cloud environments and avoid breaches. With 15 percent of respondents reporting they’ve had a cloud security incident, criminals are seeking to exploit organizations’ cloud vulnerabilities,” said Zohar Alon, Head of Cloud Product Line, Check Point Software Technologies.  “Enterprises need to get holistic visibility across all of their public cloud environments, supported by cloud-native policy automation, compliance enforcement, privileged identity protection and event analysis, to make their cloud deployments more secure and manageable.”

The 2019 Cloud Security Report is based on the results of an online survey conducted in Spring 2019. 674 responses from cybersecurity and IT professionals were received.

More details.


Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.