Why Cloud Security Must Be a Team Effort 

Over the past year, malicious actors have discovered just how disruptive and lucrative cyberattacks can be, while experts predict cybercrime will cost $10.5 trillion in damages by 2025. Spurred by an increased need for remote access, hackers are gaining more access to organizations’ data and systems with minimal effort through cloud servers that haven’t been configured securely.

In fact, from 2019 to 2020, there was a staggering 75% YoY increase in data breaches, according to Verizon’s 2021 Data Breach Investigations Report. The widely-cited annual report highlighted the growing threat of cyberattacks in the cloud.

As attacks grow and become more sophisticated, cloud protection can no longer be a job relegated to IT. From building skills that help detect attacks to backing up data regularly, cloud security is a company-wide responsibility. 

Cloud’s Biggest Vulnerability? Humans.

Most breaches can be traced back to human error. Whether it’s due to poor security practices, a misconfiguration or an intentional misuse of privileges, 85% of breaches last year involved mistakes made by employees and third-party contractors, according to the Verizon report. As hackers follow organizations to the cloud, companies must realize that strong cloud security starts with strong people security. 

“Your job is not to secure your computers but your organization. And if you’re not securing your people, you’re not securing your organization,” security expert Gabe Bassett wrote in the report.

Employees’ credentials, in particular, remain some of the most highly sought-after data types. More often than not, credentials now reside in the cloud—making it an obvious target for bad actors. More than 61% of breaches involve phishing, brute-forcing weak passwords or multi-factor authentication (MFA) bypass. And cybercriminals’ credential-stealing tactics are getting even more sophisticated. It takes just a single mediocre password to compromise an entire company’s security, highlighting the importance of everyone’s commitment to security, not just IT.

Cloud security is a team sport. It requires a game plan as well as company-wide buy-in and coordination. In practice, that means employees across the organization don’t just learn essential security skills (like creating strong passwords and using multi-factor authentication), but “practice” them regularly as well. 

That can look like routinely organizing training sessions and internal phishing campaigns to sharpen employees’ threat detection skills and build foundational security awareness across all aspects of the business. The goal is for team members to be prepared for different kinds of threats, build the muscle memory to detect them, and then become methodically paranoid. The goal? To improve cybersecurity hygiene across the business. 

In addition to awareness building and hands-on training, organizations should also implement periodic service account credential rotations, password managers and other zero-trust security guidelines to improve their identity-based security posture. A zero-trust architecture is the most effective way today to guarantee that only those who should have access to the cloud are granted it.

Minimizing Consequences From Inevitable Attacks 

Even with flawless security training and practices, some breaches, such as ransomware attacks, are unavoidable. According to Verizon, 13% of all breaches last year involved some form of ransomware, with more recent data pointing to an astounding 138% YoY increase in these attacks. Recent high-profile ransoms paid by organizations whose services were disrupted or compromised have shown how profitable ransomware can be, motivating hackers and giving rise to ransomware-as-a-service (RaaS). 

Even more difficult to prevent are attacks that involve exploiting a vulnerability in company code. While these are often the hacks that grab headlines due to the precision and level of technical expertise required, they represent just 3% of all breaches, according to Verizon. Yet, even that is too much risk for most companies today. 

There are some measures companies can take to safeguard a business against technically sophisticated attacks. Implementing continuous vulnerability scanning to identify and patch major vulnerabilities is one way; here, continuously analyzing up to 2,400 potentially applicable vulnerabilities a year has minimized the chances of a high or critical vulnerability being exploited for us and for our customers, as well. But, inevitably, hackers can slip through the cracks.

That’s when a fully-tested backup and recovery plan becomes essential. A cloud backup is a copy version of a database that lives in a secondary location, and is used to keep services online even during a catastrophic event, such as equipment failure or a system compromise. Backup and recovery plans are the most crucial, foundational security control for organizations to respond to all types of incidents. 

Organizations serious about avoiding downtime should opt for cloud providers that offer simple-to-understand and automated backup and recovery services. However, employees also play a key role in maintaining cloud backups. Organizations should have employees schedule backups daily, weekly or biweekly (depending on your needs) to provide a seamless database restore that keeps services up and running in the event of an emergency. 

As Threats Grow, So Too Must Vigilance 

Hackers aren’t going anywhere. On the contrary, they’re getting more creative, resourceful and dangerous. It takes a true team to protect a business against cloud vulnerabilities and attacks in today’s distributed world. By giving all employees the resources they need to understand, prevent and prepare for threats, organizations can help reduce—and potentially even eliminate—the most common types of cloud breaches. 

Featured eBook
The Dangers of Open Source Software and Best Practices for Securing Code

The Dangers of Open Source Software and Best Practices for Securing Code

More and more organizations are incorporating open source software into their development pipelines. After all, embracing open source products such as operating systems, code libraries, software and applications can reduce costs, introduce additional flexibility and help to accelerate delivery. Yet, open source software can introduce additional concerns into the development process—namely, security. Unlike commercial, or ... Read More
Security Boulevard

Joseph Zhou

As Chief Information Security Officer, Zhou leads all aspects of security risk management for Linode, playing a significant role in strengthening the security of Linode's cloud infrastructure which millions of developers and companies rely on. Zhou leads a team of security professionals spanning enterprise security architecture, network security, business continuity, security awareness training, and more. He brings a wealth of industry experience to the role, and previously served in CISO roles at Evive and Transworld Systems. Zhou earned a Master of Computer Science in Networking and Software Engineering from The University of Minnesota-Twin Cities, a Master of Business Administration from The University of Chicago – Booth School of Business, and an Advanced Cybersecurity Certificate from Stanford University. He is a graduate of Carnegie Mellon University’s Chief Information Security Officer Certificate Program.

joseph-zhou has 1 posts and counting.See all posts by joseph-zhou