{"id":15889,"date":"2020-01-30T10:00:48","date_gmt":"2020-01-30T04:30:48","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=15889"},"modified":"2020-07-27T17:55:49","modified_gmt":"2020-07-27T12:25:49","slug":"cloud-security-challenges-in-2020-and-beyond","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/cloud-security-challenges-in-2020-and-beyond\/","title":{"rendered":"Cloud Security Challenges in 2020 and Beyond"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The first of January ushered in an era of hyper digitization. The more data that\u2019s generated, the more your business will be exposed to risk. So no matter how you look at it, security will be critical to business relevance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cloud makes big data, automation, and enhanced agility possible. Keeping all this data secure, including highly sensitive information, is everyone\u2019s responsibility (from the board down to new recruits).\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the <\/span><a href=\"https:\/\/www.cybersecurity-insiders.com\/portfolio\/2019-cloud-security-report-isc2\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">2019 Cloud Security Report<\/span><\/a><span style=\"font-weight: 400;\">, data loss and leakage was the primary concern of 64% of<a href=\"https:\/\/www.the-next-tech.com\/security\/upcoming-cybersecurity-trends-for-2020\/\"> cybersecurity<\/a> professionals. The key to keeping your business secure comes down to understanding the current threat landscape, staying prepared, and learning from the past.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what cloud security challenges can we expect this year? Let\u2019s take a look.<\/span><br \/>\n<!-- Home page 728x90 --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\" data-ad-slot=\"3152971286\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2>Challenge One: Ransomware Attacks<\/h2>\n<p><span style=\"font-weight: 400;\">Over the last three years, ransomware cemented its place as a critical threat to enterprises and citizens alike. Throughout this time, ransomware has gone through a period of accelerated evolution.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If we take <\/span><a href=\"https:\/\/thehackernews.com\/2019\/07\/linux-malware-windows-bluekeep.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">BlueKeep<\/span><\/a><span style=\"font-weight: 400;\">, for example, this remote code execution vulnerability in the Windows Remote Desktop Services (RDPS), can have devastating consequences for organizations that fail to prepare (so be sure to download all the updated patches!).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, a hacker can take complete control of vulnerable systems by merely sending out requests over an RDP protocol. But as IT services or companies continue to fail to complete their disaster recovery protocols, it\u2019ll leave the door wide open for threat actors to enter.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Iran&#8217;s <\/span><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/12\/04\/iranian-hackers-launch-malicious-new-wiper-malware-ibm-warns-of-destructive-attacks\/#360a26317ec2\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">state-sponsored hackers<\/span><\/a><span style=\"font-weight: 400;\"> have also been reported to have deployed a new strain of malicious malware known as Wiper that can potentially &#8220;wipe out&#8221; enterprise technological infrastructure by deleted everything stored on the hardware.<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/mobile-apps\/best-11-vocabulary-building-apps-for-adults-2021\/\">12 BEST Vocabulary Apps For Adults In 2024<\/a><\/span>\n<h2>Challenge Two: Insecure Access Points<\/h2>\n<p><span style=\"font-weight: 400;\">One of the primary reasons why businesses adopt the cloud is to enable enhanced agility and accessibility. For example, remote working is now common because enterprise clouds can be accessed from anywhere.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, if user interfaces don\u2019t boast robust security, hackers will be able to find a way to exploit it. So it\u2019ll be critical to deploy behavioral web application firewalls that analyze inbound traffic.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While this approach doesn\u2019t guarantee 100% security, it\u2019ll go a long way to help protect your applications.\u00a0<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/development\/11-best-ways-to-improve-personal-development-and-self-growth-and-its-benefit-on-our-life\/\">11 best ways to Improve Personal Development and Self-Growth and its Benefit on our Life<\/a><\/span>\n<h2>Challenge Three: Security and Compliance an Afterthought<\/h2>\n<p><span style=\"font-weight: 400;\">Sometimes, companies in a rush to digitally transform their legacy infrastructure, fail to consider security and compliance implications right from the beginning. This scenario continues to be a problem across industries for the foreseeable future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.linkedin.com\/in\/damienmasonuk\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Damien Mason<\/span><\/a><span style=\"font-weight: 400;\">, Expert Reviewer at ProPrivacy, \u201cone way that companies can improve is to conduct regular third-party audits by trusted security firms. This helps to preserve trade secrets, which are unlikely to disappear any time soon while minimizing the chances of poor implementation and misconfiguration \u2013 core reasons for many of the breaches we\u2019ve seen. They should also make use of rewarding bounty systems that encourage freelance <a href=\"https:\/\/www.the-next-tech.com\/security\/how-to-improve-cybersecurity-in-2020\/\">security experts<\/a> to report weaknesses, allowing the company to swiftly patch it\u2026 Security and privacy measures are not optional additions to service; they are compulsory in 2020. Companies should be held responsible when appropriate measures have not been taken to mitigate security issues, both before and after they happen.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While security is critical for businesses, it\u2019s also important to consider regulatory compliance implications. <\/span><a href=\"https:\/\/artmotion.eu\/en\/insights\/blog\/the-first-year-of-gdpr-cost-businesses-over-eur359-million-in-fines.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">General Data Protection Regulation (GDPR)<\/span><\/a><span style=\"font-weight: 400;\"> violations, for example, can easily cripple small and medium-sized enterprises.<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/what-is-cognition-new-ai-software-devin-ai\/\">What Is Cognition\u2019s New AI-Software \u201cDevin AI\u201d All About? (Complete Guide)<\/a><\/span>\n<h2>Challenge Four: Human Error<\/h2>\n<p><span style=\"font-weight: 400;\">Throughout the technological revolution, human errors have led to data breaches. Even though almost all of us are now familiar with social engineering techniques like \u201ccredential phishing,\u201d it remains a successful tool leveraged by bad actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.linkedin.com\/in\/mateo-meier\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Mateo Meier<\/span><\/a><span style=\"font-weight: 400;\">, Founder and CEO of the cloud security company <\/span><a href=\"https:\/\/artmotion.eu\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Artmotion<\/span><\/a><span style=\"font-weight: 400;\">, \u201cin recent years, potential clients approach us to outsource their data security protocols so they would be free to focus on their business. However, while robust tools like our military-grade encryption will keep sensitive information secure in our data centers, it\u2019s still important to always follow best practices in the current threat landscape.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While it might come as a surprise to anyone who has worked in production environments, mistakes do happen. The larger the organization (with a wide array of different accounts), the more significant the company\u2019s exposure to risk.<\/span><\/p>\n<h2>Challenge Five: Artificial Intelligence Attacks<\/h2>\n<p><span style=\"font-weight: 400;\">Artificial Intelligence (AI) has come a long way. These days, speech recognition, task automation, and chatbots are everywhere, and companies are reaping the benefits.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These smart algorithms can also be leveraged to <\/span><a href=\"https:\/\/dazeinfo.com\/2019\/04\/10\/artificle-intelligence-cyber-security-tool-for-hackers-in-2019\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">detect malicious software on networks<\/span><\/a><span style=\"font-weight: 400;\">, accelerate incident response times, or even block access completely to improve the security of an organization. Furthermore, AI helps enhance security tools and analyze streaming data much faster than humans to detect a threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, at the same time, AI can increase your exposure to risk as hackers, and state-sponsored attackers are always innovating to breach enterprise systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s why experts fear that it will be only a matter of time before bad actors leverage <a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/how-artificial-intelligence-can-improve-the-organization-rules\/\">Artificial Intelligence<\/a> to develop mutating malware that\u2019s designed to avoid detection. This approach has the potential to create a situation where smart algorithms fight each other within your technological infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So it\u2019ll be critical in 2020 and beyond to actively mitigate risks, learn from human errors, and adapt rapidly in the fast-evolving threat landscape. It\u2019s also essential to complete your disaster recovery plan and reexamine it (regularly).<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first of January ushered in an era of hyper digitization. The more data that\u2019s generated, the more your business<\/p>\n","protected":false},"author":619,"featured_media":15963,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"image","meta":[],"categories":[49],"tags":[],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/15889"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=15889"}],"version-history":[{"count":8,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/15889\/revisions"}],"predecessor-version":[{"id":24948,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/15889\/revisions\/24948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/15963"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=15889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=15889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=15889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}