80% of Companies Have Suffered Data Breaches in the Cloud

The use of the cloud is increasingly present among private users and also companies. It is a very interesting option to keep our files and documents available anywhere, create backup copies and also, now that remote work has increased, to be able to share content with others remotely. However, this also brings security problems if we do not take the necessary precautions. In this article we echo a report that shows how 80% of companies have suffered a data breach in the cloud in recent months.

data breaches in the cloud

80% of companies have suffered a data breach in the cloud

Specifically, as indicated in this study, 8 out of 10 companies have suffered some data breach in the cloud in the last 18 months. But we are talking about at least one leak. Another fact to keep in mind is that 43% of the companies analyzed have suffered 10 or more data breaches in the cloud. These are undoubtedly more than important figures.

This study has been carried out by the company Ermetic , a specialist in cloud security. It has warned that a large number of companies in very varied sectors have suffered some data leakage when using the cloud. This is undoubtedly a problem that puts the privacy of that company at risk and can expose valuable confidential data.

Now, what is the reason for these data leaks? 67% believe these attacks are due to incorrect security settings, 64% also lacked adequate visibility of access settings and activities, as well as 61% due to identity and access management permission errors.

Data security in the cloud

The options that hackers have to attack are very varied. They use very different methods to achieve their goals. But, as we have seen, something essential in most cases is the theft of information, the leak of data and access to systems and devices.

The cloud is now much more used than it was a few years ago. This offers a wide range of possibilities, as we have seen. However, it also has security problems that can affect us. It is important to take into account certain measures to protect our data and not compromise our systems at any time.

Always essential is to use services that are reliable . Sometimes we can make use of third-party applications, for example. It is important that we always use the official platforms, that we download the software from legitimate sites and that, in short, we do not make mistakes when using the multiple platforms that are available.

It will also be essential to have security tools in our system. This is something that we must apply regardless of the type of device or operating system that we are using. We have many options at our disposal.

But without a doubt something vital is going to be common sense. Many attacks will require user interaction. For example, we are talking about Phishing attacks.