{"id":2601,"date":"2021-09-02T09:06:36","date_gmt":"2021-09-02T09:06:36","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=2601"},"modified":"2021-12-09T14:36:56","modified_gmt":"2021-12-09T09:06:56","slug":"threats-on-the-cloud-are-constantly-evolving","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/","title":{"rendered":"Threats on the cloud are constantly evolving &#8211; here\u2019s how you can safeguard your assets"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">According to a <\/span><a href=\"https:\/\/assets.kpmg\/content\/dam\/kpmg\/ca\/pdf\/2018\/03\/cloud-computing-risks-canada.pdf\"><span style=\"font-weight: 400;\">KPMG report<\/span><\/a><span style=\"font-weight: 400;\">, the five major risks in cloud computing are related to data security, technology, operations, vendors, and finance. All of these risks can result in business interruption, loss of revenue and reputation, as well as failure in regulatory compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What accounts for the vulnerabilities and risks in cloud infrastructure? According to the report, these risks and vulnerabilities arise due to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of visibility into controls over initiation, authorization, recording, processing, or reporting of transactions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unauthorized data access by a service provider and\/or less control over who sees what data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data leakage or access risks due to multi-tenancy or shared infrastructure between different organizations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of flexibility over data protection mechanisms<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/www.flexera.com\/blog\/it-visibility\/trends-in-it-visibility-and-vulnerability\/\"><span style=\"font-weight: 400;\">report by Flexera<\/span><\/a><span style=\"font-weight: 400;\"> states that vulnerabilities such as hardware sprawl (many models), software sprawl (many versions), cloud sprawl (many VMs and other assets), and lifecycle management are top areas of concern for tech decision makers regarding IT assets.<\/span><\/p>\n<p><a href=\"https:\/\/dataprot.net\/statistics\/malware-statistics\/\"><span style=\"font-weight: 400;\">It has also been reported<\/span><\/a><span style=\"font-weight: 400;\"> that every day in 2021 there are at least 560,000 instances of new malware being created and detected &#8211; so keeping IT assets secure needs to be a top priority in any enterprise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Knowing where you\u2019re at risk and understanding how to pre-empt or counter it helps an enterprise save time, money and other valuable resources that drive your business.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Threats can be both external and internal<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Malware constitutes the external threats, while vulnerabilities are the internal threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vulnerabilities include sensitive data exposure, broken authentication, broken access control and so on. Once a security vulnerability is uncovered, it&#8217;s important to immediately patch it; if you&#8217;ve found it, malicious actors could too.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vulnerabilities can be exploited in different ways depending on the nature of the vulnerability and motives of the attacker; it could be caused by mistakes in coding, improper access privileges, unanticipated interactions of different software programs and system components.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore vulnerability assessments are required to identify what can affect the systems on the network.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What are the ways to avoid vulnerabilities?<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update systems, networks, and software as soon as an update is available. Do not delay or postpone. <\/span><a href=\"https:\/\/www.cloudnowtech.com\/blog\/3-steps-towards-ensuring-your-data-on-the-cloud-is-safe\/\"><span style=\"font-weight: 400;\">Conduct cybersecurity audits<\/span><\/a><span style=\"font-weight: 400;\"> as well. IT teams should regularly re-evaluate their networks to identify new flaws in their network security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Be wary of automatic running of &#8220;safe&#8221; scripts as these can be a risk as malware can mimic them. Many services and protocols are vulnerable to spoofing attacks, which allows users to unintentionally send the attacker information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Make sure the authentication systems are secure and ensure minimum granular access rights: An authentication process verifies users, so they cannot access critical data stores or interact with a network\u2019s configuration<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure employees are well trained! An employee unfamiliar with cybersecurity best practices might accidentally download harmful malware by clicking on an infected link for instance.<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 400;\">Threats and vulnerabilities to the cloud are ever-evolving, and there are always challenges and risks associated with cloud adoption. In <a href=\"https:\/\/www.cloudnowtech.com\/cloud-migration-services.html\">cloud migration<\/a>, the right <\/span><\/i><a href=\"https:\/\/www.cloudnowtech.com\/cloud-advisory-services.html\"><i><span style=\"font-weight: 400;\">cloud services and technology solutions provider<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> can make all the difference. That\u2019s where CloudNow\u2019s expertise in cloud-native development and security come into play. <a href=\"https:\/\/www.cloudnowtech.com\/contact-us.html\">Schedule a consultation with us today!<\/a><\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a KPMG report, the five major risks in cloud computing are related to data security, technology, operations, vendors, and finance. All of these risks can result in business interruption, loss of revenue and reputation, as well as failure in regulatory compliance. What accounts for the vulnerabilities and risks in cloud infrastructure? According to [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":2602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[29],"tags":[285,286,287],"class_list":["post-2601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-consulting-services","tag-cloud-services-and-technology-solutions-provider","tag-cloud-solution","tag-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threats on the cloud are constantly evolving - here\u2019s how you can safeguard your assets - Discover Better Value Faster<\/title>\n<meta name=\"description\" content=\"Threats on the cloud are constantly evolving. Knowing where you\u2019re at risk and how to pre-empt or counter it helps an enterprise save time, money and other resources that drive your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threats on the cloud are constantly evolving - here\u2019s how you can safeguard your assets - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"Threats on the cloud are constantly evolving. Knowing where you\u2019re at risk and how to pre-empt or counter it helps an enterprise save time, money and other resources that drive your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-02T09:06:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-09T09:06:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&ssl=1\",\"width\":1140,\"height\":760,\"caption\":\"Threats on the cloud are constantly evolving\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/\",\"name\":\"Threats on the cloud are constantly evolving - here\\u2019s how you can safeguard your assets - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#primaryimage\"},\"datePublished\":\"2021-09-02T09:06:36+00:00\",\"dateModified\":\"2021-12-09T09:06:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"description\":\"Threats on the cloud are constantly evolving. Knowing where you\\u2019re at risk and how to pre-empt or counter it helps an enterprise save time, money and other resources that drive your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threats on the cloud are constantly evolving &#8211; here\\u2019s how you can safeguard your assets\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threats on the cloud are constantly evolving - here\u2019s how you can safeguard your assets - Discover Better Value Faster","description":"Threats on the cloud are constantly evolving. Knowing where you\u2019re at risk and how to pre-empt or counter it helps an enterprise save time, money and other resources that drive your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/","og_locale":"en_US","og_type":"article","og_title":"Threats on the cloud are constantly evolving - here\u2019s how you can safeguard your assets - Discover Better Value Faster","og_description":"Threats on the cloud are constantly evolving. Knowing where you\u2019re at risk and how to pre-empt or counter it helps an enterprise save time, money and other resources that drive your business.","og_url":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/","og_site_name":"Discover Better Value Faster","article_published_time":"2021-09-02T09:06:36+00:00","article_modified_time":"2021-12-09T09:06:56+00:00","og_image":[{"width":1140,"height":760,"url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&ssl=1","width":1140,"height":760,"caption":"Threats on the cloud are constantly evolving"},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/","name":"Threats on the cloud are constantly evolving - here\u2019s how you can safeguard your assets - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#primaryimage"},"datePublished":"2021-09-02T09:06:36+00:00","dateModified":"2021-12-09T09:06:56+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"description":"Threats on the cloud are constantly evolving. Knowing where you\u2019re at risk and how to pre-empt or counter it helps an enterprise save time, money and other resources that drive your business.","breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/threats-on-the-cloud-are-constantly-evolving\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Threats on the cloud are constantly evolving &#8211; here\u2019s how you can safeguard your assets"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-46.jpg?fit=1140%2C760&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=2601"}],"version-history":[{"count":5,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2601\/revisions"}],"predecessor-version":[{"id":3166,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2601\/revisions\/3166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/2602"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=2601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=2601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=2601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}