{"id":37942,"date":"2019-02-22T07:04:54","date_gmt":"2019-02-22T07:04:54","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=ab4b09140ff9d91fdf56b7abe9156f75"},"modified":"2019-02-22T07:04:54","modified_gmt":"2019-02-22T07:04:54","slug":"check-point-reveals-cloud-and-mobile-security-threats-are-growing","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/check-point-reveals-cloud-and-mobile-security-threats-are-growing\/","title":{"rendered":"Check Point reveals cloud and mobile security threats are growing"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/clare-hopping\">Clare Hopping<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">22 Feb, 2019<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p> Criminals are increasingly targeting the cloud and mobile environments of businesses because they\u2019re the least protected infrastructure, Check Point has revealed.<\/p>\n<p>The insights are backed up by evidence in the form of the cyber security company\u2019s 2019 Security Report, with almost a fifth of businesses having\u00a0experienced a security incident over the last 12 months, including data leaks and breaches and malware.<\/p>\n<p>\u201cThe third installment of our 2019 Security Report shows just how vulnerable organizations are to attacks targeting their cloud and mobile estates, because there is a lack of awareness of the threats they face and how to mitigate them,\u201d said Zohar Alon, head of cloud product line at Check Point Software Technologies. \u201cAs nearly 20% or organizations have experienced a cloud incident in the past year, it\u2019s clear that criminals are looking to exploit these security gaps.\u201d<\/p>\n<p>The reason so many businesses are being targeted is because 30% feel it\u2019s the responsibility of their cloud provider to protect them against threats and this means they\u2019re not sufficiently protecting their cloud infrastructure. However, it\u2019s widely recommended by cloud providers that this duty to protect a cloud environment is shared between the provider and the customer.<\/p>\n<p>The most prevalent threats in the cloud are misconfiguration of cloud platforms, which was highlighted by 62% of businesses, with unauthorised access to cloud platforms cited as a problem by 55% of IT professionals. Those questioned also said insecure interfaces and APIs were a big problem in their organisation.<\/p>\n<p>Mobile environments are also more at risk because businesses are failing to use mobile defences to protect their infrastructure, whether that\u2019s by implementing malware detection or monitoring the usage of devices for system vulnerabilities.<\/p>\n<p>In fact, less than 10% of IT professionals thought mobile threats presented a significant risk to their business, failing to recognise that malware can very easily propagate between mobile devices on a central network.<\/p>\n<p>\u201cBy reviewing and highlighting these developments in the Report, organizations can get a better understanding of the threats they face, and how they prevent them impacting on their business,\u201d Alon said. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Clare Hopping<\/p>\n<p>        22 Feb, 2019    <\/p>\n<p>       Criminals are increasingly targeting the cloud and mobile environments of businesses because they\u2019re the least protected infrastructure, Check Point has revealed.<br \/>\nThe insights are backed up by&#8230;<\/p>\n","protected":false},"author":400,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-37942","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/400"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=37942"}],"version-history":[{"count":3,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37942\/revisions"}],"predecessor-version":[{"id":37999,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37942\/revisions\/37999"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=37942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=37942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=37942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}