Many data breaches are being caused by misconfigured clouds

Organizations struggle to properly protect the assets found within their cloud infrastructure.

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Data breaches are getting more expensive, and they’re frequently occurring due to misconfigured publicclouds, new research has claimed.

A new report from IBM claims that 19% of data breaches happen because IT teams fail to properly protect the assets found within their cloud infrastructure. Polling 524 organizations that suffered a data breach between August 2019 and April 2020, IBM also found that the average cost of a data breach increased by half a million dollars during that time.

Many organizations rely onmulti-cloud infrastructure, especially with the Covid-19 pandemic forcing everyone to work remotely. Still, for more than half (52%), securing data stored in the public cloud is a challenge.

The risk is not discouraging them, however. Almost all (85%) of IT organizations are either considering, or already using the public cloud. They’re happy to accept these shortcomings, as the positives outweigh the negatives: cloud infrastructure is capable of increasing effectiveness and visibility in complex networks, as well as taking the workload from on-premise networks which are often unable to properly support mobile workforces.

Using zero trust

Using zero trust

The report further states that the main two approaches IT organizations take, when securing their cloud infrastructure, are zero trust frameworks and IP whitelisting.

Zero trust frameworks secure user-to-application gateways, freeing the software developer from the need to enter the network to access cloud resources from their home office. That way, admins can limit what each employee can do within the system.

IP whitelisting, on the other hand, creates a list of approved IP addresses that can enter the network and access its resources. Usually, admins would assign static and dedicated IP addresses to all employee devices. Still, this approach can sometimes be too expensive, especially for smaller companies.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

IBM believes they can stay resilient by implementing easily scalable third-party solutions.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

This new phishing strategy utilizes GitHub comments to distribute malware

Arcane season 2 finally gave us the huge Caitlyn and Vi moment we’ve been waiting for – and its creators say ‘we couldn’t have done it in season one’