According to the survey, cloud servers are the most popular attack vector for cyberattacks.
New data shows cloud servers are now the number one access point for cyberattacks. With 41% of companies identifying, it is the primary entry point. The situation is only growing worse, with a 10% increase in hacks utilizing cloud servers as their initial point of entry every year. They’ve now surpassed corporate servers as the primary route for hackers to get access to businesses. As per the statistics gathered by cyber insurance company Hiscox 5,181 experts from eight countries believe, it’s not just Cloud servers that are allowing hackers in, but 40% of organizations identified business emails as the primary entrance route for cyberattacks.
How else are businesses jeopardized?
Other popular entry methods were remote access servers (RAS) named by 31% of respondents, and employee-owned mobile devices, cited by 29% with a 6% increase from the previous year. Distributed denial of service (DDoS) attacks were also mentioned by 26% of those polled. The statistics also revealed some information on how cyberattacks affect various countries. Businesses in the United Kingdom were found to be the least likely of any country questioned to have experienced a cyber attack in the previous year, with 42%, notably outperforming the Netherlands and France, which had statistics of 57% and 52%, respectively. On the other hand, the UK had the highest median cost for cyberattacks of any country studied, coming in at $28,000. Cloud server-based assaults are not limited to tiny, underfunded businesses. Accenture, one of the world’s top IT consulting organizations, recently experienced a LockBit ransomware assault that compromised a cloud server environment.
Hackers are aware that businesses are increasingly relying on the cloud. Cloud hacks may result in compromised data and compliance violations, which may result in hefty penalties and a loss of customer confidence. There are numerous methods for preventing cloud attacks, including preventing identity theft, mandating multi-factor authentication, and restricting credential sharing. Work together with your service provider to verify that suitable security measures are in place to thwart possible cyberattacks.