Top Cloud Security concerns are data leak and data loss

Synopsys Technologies, a California based Cybersecurity company has conducted a survey recently in association with our Cybersecurity Insiders and concluded that accidental data leak of credentials and data control topped as primary concerns in the minds of senior IT and security managers who were looking to reap in the benefits of cloud computing.

The “2019 Cloud Security Report” of Synopsys was compiled after researching 400,000 of community members related to Information Security on LinkedIn which includes valuable inputs from senior-level managers in IT and security operations.

Only one-third of them said that they were extremely confident of their cloud security posture while 47% of them said that they were moderately confident.

Most of the respondents agreed that legal and regulatory compliance was one of the major concerns for them apart from data loss and confidentiality. Credential exposure due to misconfiguration, data sovereignty, and the incident response was also considered as daily operational headaches for the respondents dealing with cloud apps.

Survey conducted by the Application testing firm based in Mountain View also highlighted some tactics which are usually being practiced by the respondents to protect their cloud-based data. Over 52% of them reported to be using access controls, 48% say that they use encryption or tokenization, and 45% of them admitted to being using general security services offered by cloud providers.

Synopsys survey says that using 3rd party security services, connecting to cloud via secure networks and using cloud security monitoring tools are some of the less used tactics by firms to protect data on cloud platforms.

So, did the top cloud services providers such as AWS, Azure and GCP take note of these concerns…hope they did!

Ad
Join over 500,000 cybersecurity professionals in our LinkedIn group "Information Security Community"!
Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display