30 Oct 2018

Top 4 cyber security risks with the cloud

October was Cyber Security Month and new information has been released that suggests that the future of cyber security lies within the cloud. Most companies now use the cloud to store, edit and share key information but, just like any other technology, the cloud is vulnerable to cyber attacks. However, many companies are still unsure how they can achieve protection against cyber attacks.

Read our blog to find out the top 4 security risks associated with the cloud.


Data Breach

This is probably one of the main concerns that businesses have with the cloud. They want to be sure that their data is private and not shared publicly. According to the Cloud Security Alliance (CSA), over 70% of the world’s businesses now operate on the cloud. However, most companies still do not have sufficient cyber security in place.

A recent study conducted by the Ponemon Institute reported that over half of security professionals believe their organisation’s security measures for protecting data held on cloud services are low. The report concluded that, overall, data breaches were three times more likely to occur with businesses that utilise the cloud than with those that do not.

Malware Attacks

When the cloud experiences a malware attack, it can compromise the integrity of sensitive information and result in stolen data. Malicious code is used to conduct a malware attack on the cloud. The code is injected into the cloud and camouflages itself to be viewed as part of the software that is running within the cloud servers themselves. This can be extremely dangerous to cloud users as the malware is undetectable.

Loss of Data

Data held on the cloud can be lost through a malicious attack, a natural disaster or a data wipe by the service provider. Losing vital information can be devastating to businesses that don’t have a recovery plan. With insufficient protection against cyber attacks, data loss is the most common result of such an attack.

Account Hijacking

Cyber attackers now have the ability to use your login information to access sensitive information and data that is stored on the cloud. Using sophisticated hacking techniques, cyber attackers can falsify and manipulate information to gain access to private files.

Protection Against Cyber Attacks

Protect your organisation from 80% of common cyber threats by completing the Cyber Essentials certification level that is most suitable to your business needs.

To work with the MOD, it is mandatory that suppliers have completed this certification. If you would like to learn more about Cyber Essentials, download our free Scheme Summary.