Trend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments

Must Read

List of First Bank of Nigeria Sort Codes in Nigeria

The sort code is a number that usually identifies both the bank and the branch where an account is held. The sort...

List of United Bank for Africa (UBA) Sort Codes & Branches (with addresses) in Nigeria

The sort code is a number that usually identifies both the bank and the branch where an account is held. The sort...

How To Block Your Bank Account And SIM Card In Case Of Emergency

Losing your phone and wallet or having them stolen can be very frustrating. However, in case that happens to...
- Advertisement -

Cybersecurity must be considered at all points of a cloud migration

 

HONG KONG, CHINA – Media OutReach – 9 April 2020 – Trend Micro Incorporated (TYO: 4704; TSE: 4704),
the global leader in cloud security,
today released the findings from research into cloud security, which
highlights human error and complex deployments open the door to a wide range of
cyber threats.

 

Gartner predicts that by 2021, over 75% of midsize and
large organizations will have adopted multi-cloud or hybrid IT strategy.[1]
As cloud platforms become more prevalent, IT and DevOps teams face additional
concerns and uncertainties related to securing their cloud instances.

- Advertisement -

 

This newly released report reaffirms that
misconfigurations are the primary cause of cloud security issues. In fact,
Trend Micro Cloud One — Conformity identifies 230 million misconfigurations on
average each day, proving this risk is prevalent and widespread.

 

“Cloud-based operations have become the rule rather than the exception,
and cybercriminals have adapted to capitalize on misconfigured or mismanaged
cloud environments,” said Greg Young, vice president of cybersecurity for Trend
Micro. “We believe migrating to the cloud can be the best way to fix security
problems by redefining the corporate IT perimeter and endpoints. However, that
can only happen if organizations follow the shared responsibility model for
cloud security. Taking ownership of cloud data is paramount to its protection,
and we’re here to help businesses succeed in that process.”

- Advertisement -

 

The research found threats and security weaknesses in
several key areas of cloud-based computing, which can put credentials and
company secrets at risk. Criminals capitalizing on misconfigurations have
targeted companies with ransomware, cryptomining, e-skimming and data
exfiltration.

Read Also:  Take off to Strategy 2025 goals: DHL Express upgrades its fleet with six new Boeing 777 Freighters this year

 

Misleading
online tutorials compounded the risk for some businesses leading to mismanaged
cloud credentials and certificates. IT teams can take advantage of cloud native
tools to help mitigate these risks, but they should not rely solely on these
tools, the report concludes.

- Advertisement -
Read Also:  Singapore Cosmeceutical Skincare Brand Recherché, Announces The Launch Of Its New Edible Skincare Range

 

Trend Micro recommends several best practices to help secure cloud
deployments:

  • Employ least privilege controls: restricting access to only those who need
    it.
  • Understand the Shared Responsibility Model:
    Although cloud providers have built-in security, customers are responsible for
    securing their own data.
  • Monitor for misconfigured and exposed systems: Tools like Conformity can
    quickly and easily identify misconfigurations in your cloud environments.
  • Integrate security into DevOps culture:
    Security should be built into the DevOps process from the start.

To read the full report, please visit: https://www.trendmicro.com/vinfo/hk/security/news/virtualization-and-cloud/exploring-common-threats-to-cloud-security


[1] Smarter With
Gartner, 5 Approaches to Cloud Applications Integration, May 14, 2019

About Trend Micro

Trend Micro
Incorporated, a global leader in cybersecurity solutions, helps to make the
world safe for exchanging digital information. Our innovative solutions for
consumers, businesses, and governments provide layered security for data
centers, cloud environments, networks, and endpoints. All our products work
together to seamlessly share threat intelligence and provide a connected threat
defense with centralized visibility and control, enabling better, faster
protection. With more than 6,000 employees in over 50 countries and the world’s
most advanced global threat intelligence, Trend Micro secures your connected
world. For more information, visit www.trendmicro.com.hk.

Trend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand Spur

- Advertisement -
Trend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand SpurTrend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand Spur

Subscribe to BrandSpur Ng

Subscribe for latest updates. Signup to best of brands and business news, informed analysis and opinions among others that can propel you, your business or brand to greater heights.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Trend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand SpurTrend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand Spur

Latest News

Europa League: Arsenal in Tough Spot After Home Draw

UEFA Europa League quarter-finals return leg will be played on Thursday evening at 8 pm live on StarTimes. Aubameyang’s Arsenal...
- Advertisement -
BrandsPur Weekly Cartoons
- Advertisement -Trend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand SpurTrend Micro Research Finds Misconfiguration as Number One Risk to Cloud Environments - Brand Spur