{"id":37945,"date":"2019-02-22T12:00:01","date_gmt":"2019-02-22T12:00:01","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2019\/feb\/22\/check-point-exposes-yet-more-shared-responsibility-misunderstandings-cloud-security\/"},"modified":"2019-02-22T12:00:01","modified_gmt":"2019-02-22T12:00:01","slug":"check-point-exposes-yet-more-shared-responsibility-misunderstandings-for-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/check-point-exposes-yet-more-shared-responsibility-misunderstandings-for-cloud-security\/","title":{"rendered":"Check Point exposes yet more shared responsibility misunderstandings for cloud security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/iStock-534636959_Dl47AU8.jpg\"><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">Almost one in five organisations polled by cybersecurity solutions provider Check Point Software say they have been victim to a cloud security incident over the past year, while more than a quarter still believe security is the responsibility of the cloud provider.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">These and other worrying findings have appeared in Check Point&rsquo;s latest study. The 2019 Security Report, of which this is the third instalment and combined data with survey responses from IT professionals and C-level executives, also found more than half (59%) of IT respondents polled did not use mobile threat defences.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">The report pulls no punches in regard to its analysis. The first section, titled &lsquo;cloud is your weakest link&rsquo;, explores how cloud services are vulnerable across three main attack vectors; account hijacking, malware delivery, and data leaks. Citing Dome9 &ndash; <a href=\"https:\/\/www.cloudcomputing-news.net\/news\/2018\/oct\/24\/check-point-software-acquires-dome9-beef-multi-cloud-options\/\" style=\"color:#0563c1; text-decoration:underline\">acquired by Check Point last year<\/a> &ndash; in a study last year which found 91% of organisations were concerned about cloud security, the report notes how exposure and default security settings remain an issue.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">&ldquo;65% of IT professionals still underestimate the damage they can cause,&rdquo; the report explained. &ldquo;The obvious concern is that organisations are not taking cloud security seriously enough. The breach of sensitive data held in the cloud is a huge risk for an organisation, and threat actors know it. The rate of cyber attacks against cloud-based targets is growing, and with little sign it will slow down.&rdquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">The statistic which causes major concern is the three in 10 respondents who affirmed security was the responsibility primarily of the cloud service provider. This, as the report noted, &lsquo;negates recommendations&rsquo; over shared, or mutual responsibility.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">This is a viewpoint which persists even though cloud providers have tried to remove some of the burden themselves. In November, Amazon Web Services (AWS) <a href=\"https:\/\/www.cloudcomputing-news.net\/news\/2018\/nov\/20\/aws-launches-new-security-offering-which-mitigates-s3-misconfigurations-if-customers-get-it-right\/\" style=\"color:#0563c1; text-decoration:underline\">launched Amazon S3 Block Public Access<\/a>, which aimed to secure at the account level, on individual buckets, as well as future buckets created.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">The move was to ensure users handled public buckets and objects &lsquo;as needed while giving tools to make sure [users] don&rsquo;t make them publicly accessible due to a simple mistake or misunderstanding&rsquo;, in the words of AWS chief evangelist Jeff Barr at the time. Previously, AWS had revamped its design to include bright orange warning indicators to signify which buckets were public.<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">&ldquo;As nearly 20% of organisations have experienced a cloud incident in the past year, it&rsquo;s clear that criminals are looking to exploit these security gaps,&rdquo; said Zohar Alon, head of the cloud product line at Check Point. &ldquo;By reviewing and highlighting these developments in the report, organisations can get a better understanding of the threats they face, and how they prevent them impacting on their business.&rdquo;<\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\">You can read the full report <a href=\"https:\/\/research.checkpoint.com\/vol-3-2019-security-report\/\" style=\"color:#0563c1; text-decoration:underline\">here (email required).<\/a><\/p>\n<p style=\"margin-left:0cm; margin-right:0cm\"><a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\"><span style=\"color:blue\"><img decoding=\"async\" alt=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" src=\"https:\/\/www.cybersecuritycloudexpo.com\/wp-content\/uploads\/2018\/09\/cyber-security-world-series-1.png\" style=\"height:59px; width:272px\" \/><\/span><\/a><strong>Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases<\/strong>? Attend the <a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" style=\"color:#0563c1; text-decoration:underline\">Cyber Security &amp; Cloud Expo World Series<\/a> with upcoming events in Silicon Valley, London and Amsterdam to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost one in five organisations polled by cybersecurity solutions provider Check Point Software say they have been victim to a cloud security incident over the past year, while more than a quarter still believe security is the responsibility of the cl&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-37945","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=37945"}],"version-history":[{"count":3,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37945\/revisions"}],"predecessor-version":[{"id":38028,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37945\/revisions\/38028"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=37945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=37945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=37945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}