{"id":21159,"date":"2019-09-12T10:47:44","date_gmt":"2019-09-12T10:47:44","guid":{"rendered":"https:\/\/www.veritis.com\/?p=7860"},"modified":"2025-06-13T11:24:00","modified_gmt":"2025-06-13T11:24:00","slug":"social-engineering-techniques-behind-cloud-related-data-breaches","status":"publish","type":"news","link":"https:\/\/demolobby.com\/veritisbeta\/news\/social-engineering-techniques-behind-cloud-related-data-breaches\/","title":{"rendered":"\u2018Social Engineering Techniques\u2019 Behind Cloud-related Data Breaches"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7858 size-full\" title=\"Social Engineering Techniques\" src=\"https:\/\/www.veritis.com\/wp-content\/uploads\/2019\/09\/social-engineering-technique.jpg\" alt=\"Social Engineering Techniques\" width=\"800\" height=\"450\" \/><\/p>\n<p>You might have heard about cloud-related breaches majorly attributed to <a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/\">cloud service providers<\/a>!<\/p>\n<p>But that\u2019s not the case all time! Kaspersky Lab has come up with some interesting revelations in its latest report titled \u2018<strong>Understanding security of the cloud: from adoption benefits to threats and concerns<\/strong>\u2019.<\/p>\n<blockquote><p>The report says 10 out of 9 breaches in the cloud are caused by human errors, and not cloud providers.<\/p><\/blockquote>\n<p>Around 90% (SMBs (88%) and enterprises (91%)) of corporate data breaches in the cloud happen due to social engineering techniques targeting customers\u2019 employees, not because of problems caused by the cloud provider.<\/p>\n<p>The study reports majority of such cases in <a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/public-cloud-computing-services\/\">public cloud infrastructure<\/a>.<\/p>\n<p>While the cloud adoption is on the rise across organizations of all sizes, majority of the companies are worried about continuity and security with the cloud, the report adds.<\/p>\n<p>Nearly, one-third of both SMBs (35%) and enterprise firms (39%) are concerned about incidents affecting IT infrastructure hosted by a third party.<\/p>\n<p>Besides impacts from external service providers, organizations stand in proximity to unexpected incidents in the cloud occurring on their side.<\/p>\n<p>Around 33 percent of incidents in the cloud are attributed to social engineering techniques that are found to change employee behavior, while only 11 percent are from cloud providers.<\/p>\n<h3>Scope for Cybersecurity<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7857 size-full\" title=\"Scope for Cybersecurity\" src=\"https:\/\/www.veritis.com\/wp-content\/uploads\/2019\/09\/scope-for-cybersecurity.jpg\" alt=\"Scope for Cybersecurity\" width=\"800\" height=\"450\" \/><\/p>\n<p>The report recommends organizations to focus more on cybersecurity measures in working with third parties.<\/p>\n<p>\u201cOnly 39% of SMBs and 47% of enterprises have implemented tailored protection for the cloud. This may be the result of businesses largely relying on a cloud infrastructure provider for cybersecurity,\u201d the report adds.<\/p>\n<p><strong>Here are some important recommendations that Kaspersky Lab makes to firms on data security in cloud:<\/strong><\/p>\n<ul>\n<li>Make employees aware about the possibility of they being threat, either by accessing unwanted links, attachments, etc. from unknown users<\/li>\n<li>Awareness on risk of the unapproved use of cloud platforms<\/li>\n<li>Build endpoint security to avoid attacks through social engineering with protection to emails, servers, browsers, etc.<\/li>\n<li>Have a dedicated cloud cybersecurity solution along with a unified management console for security across all cloud platforms<\/li>\n<li>Allow automatic detection of cloud hosts as well as auto-scale the roll out of protection to each one<\/li>\n<\/ul>\n<p>\u201cThe first and foremost step while migrating to the cloud is to consider the security of business data and related workloads. Our research shows that companies should be more attentive to the cybersecurity hygiene of their employees and take measures that will protect their cloud environment from the inside,\u201d says Maxim Frolov, Vice President of Global Sales at Kaspersky Lab.<\/p>\n<p><em>Want to check Veritis <a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/disaster-recovery-services\/\">Cloud Disaster Recovery<\/a> Offering?<\/em><\/p>\n<hr \/>\n<p><strong>Related Stories<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.veritis.com\/blog\/how-to-plan-an-effective-cloud-disaster-recovery-strategy\/\">How to Plan an Effective Cloud Disaster Recovery Strategy?<\/a><\/li>\n<li><a href=\"https:\/\/www.veritis.com\/solutions\/cloud\/managed-services\/\">Cloud Managed Services Providers<\/a><\/li>\n<\/ul>\n","protected":false},"featured_media":7859,"parent":0,"menu_order":0,"template":"","tags":[111,191,192,193,19,194,195,24],"class_list":["post-21159","news","type-news","status-publish","has-post-thumbnail","hentry","tag-cloud","tag-cloud-disaster-recovery","tag-cloud-infrastructure-provider","tag-cybersecurity","tag-public-cloud","tag-scope-for-cybersecurit","tag-social-engineering-techniques","tag-veritis"],"acf":[],"_links":{"self":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/news\/21159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/media\/7859"}],"wp:attachment":[{"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/media?parent=21159"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/demolobby.com\/veritisbeta\/wp-json\/wp\/v2\/tags?post=21159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}