Even with cloud providers implementing defenses, glaring weaknesses remain

A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments. Poor user and API access hygiene, combined with ineffective visibility and user activity monitoring, are causing organizations to be more vulnerable to breaches. For example, 73% of organizations allow the root user account to be used to perform activities – behavior that goes against security best practices. Furthermore, 16% of organizations have user accounts that have potentially been compromised.

Read about the new study by RedLock which reveals that cloud services remain vulnerable to hackers and cybercriminals on Help Net Security.

 

Track the strategic threats to your business with the Threat Brief, delivered to your email daily.

Subscribe Here