Cloud Assaults Are On The Surge::. Protection & Resiliency. :: Midsize Expert.

A new report from Alert Logic shows that attacks on cloud hosting providers are falling in line with attacks on traditional data centers. Midsize businesses looking to leverage the power of the cloud can take some solace in that fact that their systems are not immediately under increased risk of attack, but they must remember that threats still remain. Cloud Attacks Make a Jump The Alert Logic report examines more than 200,000 security incidents at more than 2,000 organizations in North America and Western Europe. The report found that while cloud attacks are on the rise, this only brings them on par with attacks at traditional data centers, and even then only for certain types of attacks, CIO reports. The most common types of attacks that cloud hosting providers faced were brute force attacks that focused on security credentials and scans for software with known security vulnerabilities. Both of these types of attacks were encountered by 44 percent of the cloud-based businesses in the study. Alert Logic claims that these numbers are significant because, for the first time, the percentage of cloud-based businesses affected by these types of attacks mirror the percentage of affected businesses with traditional, on-premise data centers. Cloud hosting providers are facing an increased threat from malware and botnet attacks, although only 11 percent of these organizations faced these types of incidents compared to the 56 percent of on-site data centers that faced these threats. The report concluded by claiming that neither form of computing is inherently more or less secure and that, over time, the number and types of attacks on cloud hosting providers will probably equal those targeting on-premise data centers. Securing the Cloud While the report is good news for midsize businesses that utilize the cloud’s flexibility to compete in the modern global marketplace, it should not provide a false sense of security. Cloud providers have long argued that their systems are more secure than individual data centers, and this new insight shows that those claims are not entirely without merit; but IT managers are still ultimately responsible for the integrity of their systems regardless of where those systems are located. IT managers should be well aware of just how costly information security breaches can be, and those who work at midsize businesses should know that a major incident could be enough to bring the business to its knees. Even if it appears that cloud services do not necessarily pose a security risk, leaving all security matters in the hands of the cloud provider could leave the system vulnerable. While the cloud provider will be responsible for security on several layers, securing the operating system and individual applications will still fall to in-house IT. Additionally, there will be security incidents that slip through even the most security-minded cloud provider, and IT managers need to have a plan in place for this eventuality. While this report on cloud security should give midsize businesses some peace of mind, the adoption of any cloud service must be done with the understanding that the in-house IT department will still be ultimately responsible for securing the company’s information. This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet. Like us on Facebook . Follow us on Twitter . IBM Solution
For the original version including any supplementary images or video, visit

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s