Human Error is the Main Cause of Data Leaks in the Cloud

Human Error is the Main Cause of Data Leaks in the Cloud

Technology may be more sophisticated, but if from the human side it cannot operate properly, it can turn into a disaster.

Such as cloud computing adoption or cloud computing that enables organizations to benefit from business processes more skillfully, reduce CAPEX, and supply information technology (IT) faster. Nevertheless, SMEs and companies continue to be overwhelmed with worry about the sustainability of cloud infrastructure and data security.

Because of incidents that affect the IT infrastructure managed by third parties. This can increase commercial risk and adverse reputation.

The latest facts from the Kaspersky Lab report reveal, more incidents that occur in public cloud infrastructure are caused by the hands of company employees who use the cloud rather than the cloud providers themselves. In fact, about 90% of corporate data violations on cloud platforms occur because of social engineering techniques that target employees, and not caused by cloud providers.

However, many companies that use cloud services require cloud providers to be responsible for the security of data stored on their cloud platforms.

Vice President of Global Sales at Kaspersky Lab Maxim Frolov, said the first step for any business when migrating to public cloud is to understand who is responsible for business data and the workload that is in it.

Cloud providers usually implement cyber security measures to protect their platforms and customers. But when the threat is on the customer's side, it is no longer the responsibility of the provider.

For this reason, Kaspersky provides tips and tricks for businesses to secure their data in the cloud. First, provide an overview to employees that they can be victims of cyber threats. "They may not click on links or open attachments in any communication from unknown sources," he added.

Then, to minimize the risk of using an irresponsible cloud platform, teach staff about the negative effects of IT shadows. As well as designing procedures for purchasing and consuming cloud infrastructure in each department.

The next step is to use endpoint security solutions to prevent social engineering attack vectors. It must include protection for the e-mail server, client e-mail and i.

"Finally, apply protection to your cloud infrastructure as soon as possible after migration," he added.

It recommends choosing a special cyber cloud security solution with an integrated management console to manage security across all cloud platforms, and supports automatic host cloud detection, as well as automatic scale of protection from each.

Kaspersky Lab Tips and Tricks For Business Players to secure their data in the cloud:

  • Provide an overview to employees that they can be victims of cyber threats. They may not click on links or open attachments in any communication from unknown sources. Special awareness training, such as the integrated Kaspersky Security Awareness, can help in this regard.
  • To minimize the risk of using cloud platforms that are not responsible, teach staff about the negative effects of shadow IT, and design procedures for purchasing and consuming cloud infrastructure in each department.
  • Use endpoint security solutions to prevent social engineering attack vectors. It must include protection for email servers, client emails and browsers.
  • Apply protection to your cloud infrastructure as soon as possible after migration. Choose a special cyber cloud security solution with an integrated management console to manage security on all cloud platforms, and support automatic host cloud detection, as well as automatic scale protection from each cloud.
  • Kaspersky Hybrid Cloud Security offers layered protection for businesses for multi-cloud environments, integrated cyber security, and the best orchestration. This solution detects threats ranging from the most common to complex and protects the entire cloud infrastructure - from on-site virtualized environments to even public cloud platforms such as AWS and Microsoft Azure.