Cloud, mobile deployments weakest links in enterprise networks: Report

Check Point Software Technologies Ltd., a cyber security solutions firm, in its third installment of the 2019 Security Report highlights how threat actors are increasingly targeting the weakest, least protected points in an organization’s IT infrastructure – their public cloud and mobile deployments. The third report reveals the key cyber-attack trends used by criminals to target enterprise cloud and mobile estates during 2018. It also reveals enterprise IT and security teams’ key security concerns about these deployments. Highlights of the third installment include:18% of organizations globally had a cloud security incident in the past year:  the most common incident types were data leaks / breaches, account hijacks, and malware infections. The top four public cloud security threats:  IT professionals rated misconfiguration of cloud platforms, leading to data loss or breaches as the biggest threat, cited by 62%; followed by unauthorized access to cloud resources (55%); insecure interfaces and APIs (50%); hijacking of accounts or data traffic (47%).

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Resources