2 min read

Stolen usernames and passwords still cause almost a quarter of all data breaches

Graham CLULEY

April 25, 2016

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Stolen usernames and passwords still cause almost a quarter of all data breaches

Companies and consumers alike love “the cloud”.

But the same security mistakes appear to be helping hackers steal data from cloud-based systems time and time again.

And it’s against that gloomy backdrop that a new report by the Cloud Security Alliance, “Identity Solutions: Security Beyond the Perimeter”, makes a worthwhile read.

According to surveys detailed in the Centrify-sponsored report, 22% of respondents whose companies had suffered a data breach said that compromised credentials were to blame.

survey

In addition, 65% of respondents indicated that the likelihood their company would experience a future breach due to compromised credentials was medium to high.

It’s understandable why home users and businesses love the cloud so much.

Internet-based services bring many benefits, such as automatic updates, the convenience to work from anywhere with an internet connection, increased collaboration and no need to be in the same place as the computer storing your data.

Of course, there are potential pitfalls with cloud-based services too – for instance, can you trust that your provider is taking security seriously?

But it’s not just that you’re placing your trust in a third-party to be acting securely to protect your data’s confidentiality and integrity. The very fact that you are putting your data on the internet, accessible from anywhere in the world, means that potentially there are greater opportunities for hackers to break in.

After all, if the server carrying your sensitive information was on your local network – rather than attached to the public internet – hackers will have a less clear route to your data.

Furthermore, rogue staff inside your organisation could also take advantage of the fact that the data is on an internet server, rather than a more tightly-controlled internal computer, to steal information.

So, if you are going to put your data in the cloud (or on “someone else’s computer” as I prefer to call it) you would be wise to recognize this, and take appropriate steps to protect it:

  • Stop reusing the same passwords in multiple places, or choosing easy-to-guess passwords to secure your accounts.
  • Harden your defences with the use of multi-factor authentication, certificates and cryptographic keys rather than allowing a simple username/password combination to unlock your data.
  • Consider, if possible, encrypting sensitive data before you upload it to the cloud.
  • Educate your staff about the threats posed by malware, and how phishing attacks are designed to steal credentials.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read