Concerns About Data Security Slow Cloud Adoption

 
 
By Karen A. Frenkel  |  Posted 02-13-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    1 - Concerns About Data Security Slow Cloud Adoption
    Next

    Concerns About Data Security Slow Cloud Adoption

    Organizations are moving to the cloud at an annual rate of 20 percent, but security concerns about critical data, applications and systems are slowing adoption.
  • Previous
    2 - Levels of Concern About Cloud Security
    Next

    Levels of Concern About Cloud Security

    • Very concerned: 56%
    • Moderately concerned: 37%
    • Slightly concerned: 5%
    • Not at all concerned: 2%
  • Previous
    3 - Concerns About Ransomware Hijacks of Data
    Next

    Concerns About Ransomware Hijacks of Data

    • Very concerned: 44%
    • Moderately concerned: 38%
    • Slightly concerned: 15%
    • Not at all concerned: 4%
  • Previous
    4 - Biggest Cyber-Threats to the Cloud
    Next

    Biggest Cyber-Threats to the Cloud

    • Unauthorized access: 67%
    • Data leakage/external sharing of data: 65%
    • Denial of service attacks: 52%
    • Insecure interfaces/APIs: 48%
    • Posting confidential data by insiders: 33%
    • Foreign state-sponsored cyber-attacks: 32%
    • Abuse of cloud services: 32%
    • Malware injection: 31%
  • Previous
    5 - Biggest Security Confidence Builders
    Next

    Biggest Security Confidence Builders

    • Visibility, reporting, auditing and alerting of security events: 74%
    • Effective mapping of security controls for internally hosted apps: 51%
    • Consistent security policies and enforcement: 48%
  • Previous
    6 - Most Effective Data Protection Methods
    Next

    Most Effective Data Protection Methods

    • Data encryption: 78%
    • Traffic encryption and VPN: 60%
    • Access control and user authorization: 56%
    • Network monitoring, reporting and forensics: 53%
    • Intrusion prevention systems: 44%
  • Previous
    7 - Attack on Major Cloud Provider Is Expected
    Next

    Attack on Major Cloud Provider Is Expected

    An attack to disrupt or take down a major cloud provider that will affect all of their customers' businesses is expected in 2017.
  • Previous
    8 - Ransomware Attacks the Cloud
    Next

    Ransomware Attacks the Cloud

    Ransomware attacks will find their way into cloud infrastructures through encrypted files that spread cloud to cloud, or by hackers that use the cloud as a volume multiplier
  • Previous
    9 - Why Cloud-Based Data Centers Are Ransomware Targets, Part I
    Next

    Why Cloud-Based Data Centers Are Ransomware Targets, Part I

    Data centers hold the most sensitive, lucrative information.

    Financially motivated cyber-criminals operate successfully in the wild by constantly seeking new targets.

    Traditional security protections don't fit the dynamic nature of cloud-based data centers, so advanced security often isn't deployed in the cloud.
  • Previous
    10 - Why Cloud-Based Data Centers Are Ransomware Targets, Part II
    Next

    Why Cloud-Based Data Centers Are Ransomware Targets, Part II

    Shared responsibility in the public cloud provides a false sense of security to customers, making their cloud environments vulnerable.

    The rise of ransomware advanced persistent threats to target cloud-based data centers will become a significant risk as data centers shift to the cloud.
 

Security concerns about critical data, applications and systems in the cloud continue to deter faster adoption of cloud services, according to a new report. "Today, perceived security risks are the single biggest factor holding back faster adoption of cloud computing," the report says. Ransomware and lateral threats are expected to become more prevalent with new attack vectors. All the same, cloud investment continues to grow 20 percent annually as organizations try to reduce IT costs, increase agility and support their business functions more effectively. The report, "Cloud Security 2016 Survey," which was conducted by Checkpoint Software Technologies, is based on a survey of 200 cyber-security and IT professionals conducted in November 2016. It reveals that security professionals prioritize encryption of both data at rest and data in motion, as well as access controls to protect sensitive data in the cloud. Included here are highlights of the survey and a blog by Donald Meyer, head of product marketing, data center and cloud.

 
 
 
 
 

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register