Home TECHNOLOGY CYBER SECURITY Ransomware Threatens The Cloud

Ransomware Threatens The Cloud

In the Corona year 2020, cloud technologies and services’ use increased significantly. IT security was given secondary priority during the hectic transition to working from home and digital offers. This has created vulnerabilities that expose companies to an increased risk of falling victim to hacker attacks such as ransomware. Multi-cloud and hybrid environments are particularly vulnerable. Ransomware attacks have been increasing for years, as the BSI stated in its annual status report at the end of October.

However, the dangerous situation has become even more acute due to the increased digital transformation in companies and the switch to working from home since the beginning of the Corona crisis. Because to protect against threats such as ransomware, the IT infrastructure and its protection must be further developed in parallel: With each newly implemented application, the IT managers have to expand and adapt the security measures accordingly.

During the pandemic, however, companies were so busy introducing new solutions and equipping home offices that protecting the latest IT infrastructure was neglected in many places.

The resulting gaps and vulnerabilities can have fatal consequences, warn the authors of the “Veritas Vulnerability Lag Report,” for which more than 2,000 IT managers from 19 countries were surveyed. Accordingly, companies are more likely to become victims of ransomware attacks and suffer data loss in the next two years. This also makes it more challenging to comply with compliance requirements.

Also Read: Cyberattack In The Home Office? This Is How Companies Protect Themselves

Increasing Complexity Makes Security Measures More Difficult

Many companies have invested in cloud solutions to switch to working from home and drive digital transformation quickly. According to the report, 64 percent of German companies implemented more new cloud functions or infrastructure elements during the pandemic than initially planned. For cost reasons, they often rely on several providers. A survey by Veritas last November found that companies use an average of 12 different cloud providers. As a result, complexity has increased to a level that IT security can often no longer keep up with.

According to the “Veritas Vulnerability Lag Report,” the security strategy in the cloud area has gaps in almost every second German company. And 45 percent of local companies say they are struggling with compliance regulations. In addition, complex cloud environments are particularly vulnerable to ransomware attacks. As attackers increasingly target online backups, there is a growing risk that the clients and the cloud data will be encrypted. And the more clouds are in use, the more difficult it is for the IT department to recover data after a ransomware attack. It is then likely that the company will meet the ransom demand.

Complex Management Of Hybrid IT Environments

To make matters worse, many applications still run on legacy systems that are controlled, monitored, and kept highly available with proven management processes and tools. When connecting this “old world” to the dynamic public cloud, the workloads are often not optimally coordinated. Management is usually isolated from one another and manual, which means that the IT teams monitor both worlds with scripts and processes they have developed. This increases the error rate and makes it difficult to get an overview of the workloads, their availability, memory utilization, and backups. Two worlds also collide regarding data backup: the proven backup concept of the data centers and the cloud concepts with the integrated backup services of the providers.

As a result, many different tools with their working methods, user interfaces, and restore technology are in use. The data is often distributed across many storage systems and fragmented infrastructures. It is becoming increasingly difficult to track where information is located and whether all critical data is secured according to the same SLAs and can be restored according to uniform policies – regardless of whether it is in the cloud, on-premises, or virtual server environments. The current report also confirms this. According to this, on average more than 30 percent of the information stored in companies is so-called dark data, the content and value of which is unknown. 34 percent of IT experts cannot even say how many cloud services are in use – let alone which ones are involved.

High Damage Caused By Ransomware Attacks

This further increases the risk of failures and data loss in hybrid environments. In Germany, 82 percent of companies have been affected by at least one such incident in the past twelve months. Each company experienced almost two ransomware attacks that resulted in downtime. The consequences are financial losses, dissatisfied customers, and image damage. To protect itself adequately, a German company would have to spend an average of almost two million euros more and hire 24 new IT employees, the study’s authors calculated. However, this is hardly feasible given the current shortage of skilled workers.

But there are effective solutions. A consolidated data protection platform used for the entire data inventory – both in the data center and in the public cloud – can significantly reduce the administrative burden of data protection. Data mapping tools are also helpful. They show connections between information and its storage location in real time and use this to create data maps. This not only gives those responsible an overview of where data is located. You can also see whether they are managed in a compliant manner. Data protection tools based on artificial intelligence (AI) and machine learning (ML) can also reduce the need for additional staff.

Also Read: Cyber ​​Attacks: Companies Fear An Increase In The Next Two Years

Tech Buzz Reviews
Techbuzzreviews are a team full of web designers, freelancers, marketing experts, bloggers. We are on a mission to provide the best technology-related news with passion and tenacity. We mainly focus on the areas like the latest technology news, upcoming gadgets, business strategies and many more upcoming trends which are trending all over the world.

Most Popular

Advertising On Facebook: How Much Does It Cost?

Advertising on Facebook is reachable for all spending plans, yet it is challenging to know unequivocally the cost to count for each mission; such...

What Is The DKIM Email Authentication Method?

Influence your excellent standing as a shipper to work on your deliverability. With DKIM, add computerized marks to your messages and pass spam checks...

Data-Driven Attribution: A Preferred Model?

Google list items show increasingly promoting efforts. Hence, it turns out to be more convoluted to hit your objective. Without a doubt, Web clients...

Multicurrency: Essential For Your International Customers

In the last fifty years, globalization has spread at a dizzying pace. More and more people are buying products online or overseas, and foreign...

Promote Your Plant-Selling E-Commerce With Facebook Ads

Facebook Ads can be an intense instrument for advancing your plant web-based business. This stage can focus on your crowd exactly founded on different...

Remarketing: Definition And Presentation Of Platforms

If the average conversion rate of an e-commerce website is around 2% (this percentage varies enormously depending on the sector of activity), nearly 98...

Expand Your Network On LinkedIn: Our Ten Tips To Adopt

Try not to disregard your LinkedIn profile and company page. Similarly, we "google" you; presently, we "interface" you. Anything that the size of your...