Cybercriminals capitalizing on our reliance on the cloud
90% of cyberattacks on cloud environments in the last 12 months involved compromised privileged credentials, according to a research from Centrify.
Most cloud environments successfully compromised
The study, which surveyed 150 IT decision makers across the U.S., found that 65% of respondents saw attempted attacks on their cloud environments, and 80% of those participants’ cloud environments were successfully compromised.
It quickly became evident that the reliability, availability, and scalability afforded by the cloud have become critical to keep organizations up and running, and cybercriminals are taking notice.
While 63% of respondents had the foresight to make the move to cloud 3-5 years ago, 25% of respondents just began their cloud transition in the last two years.
31% utilize hybrid and multi-cloud environments, while 45% take a private cloud-only approach, and 23% rely on public cloud. Availability was resoundingly the top cloud benefit amongst respondents (46%), followed by collaboration (28%), cost savings (15%), and scalability (9%).
Managing multi-cloud environments: The greatest cloud transition challenge
Despite the prevalence of cyberattacks targeting the cloud, managing multi-cloud environments was identified as the greatest cloud transition challenge (36%), followed by cybersecurity risks and cloud migration (both 22%). In addition, 19% cited maintaining compliance in the cloud as an ongoing issue.
“Cybercriminals are capitalizing on our reliance on the cloud, and they’re no longer just hacking in. They’re logging in,” said Art Gilliland, CEO, Centrify.
“With almost all of the attacks on the cloud caused by stolen privileged credentials, the security stack must include a centralised PAM solution architected in the cloud, for the cloud. This approach will minimise the attack surface and control privileged access to hybrid environments, even as it evolves post-COVID-19.”