Connect with us

Infosecurity

Will a Major Cloud Vendor Be Breached in 2017? Cybersecurity Experts Say Yes

Published

on

Will a Major Cloud Vendor Be Breached in 2017? Cybersecurity Experts Say Yes

As 2016 winds down, cybersecurity experts are raising alarms about a looming threat: a cloud vendor breach that could shake the industry. According to predictions from leading threat researchers, the next year may finally see a major cloud provider suffer a significant security incident. This forecast comes amid growing reliance on cloud services for storing sensitive data, from healthcare records to corporate secrets.

But why now? And what does this mean for businesses that trust these platforms? Let’s dive into the expert opinions and the factors driving this unsettling prediction.

Why a Cloud Vendor Breach Is Inevitable in 2017

Experts argue that the cloud industry has been remarkably quiet on the breach front since the Aurora attacks on Google in 2009. Yet, data shows that 89% of healthcare organizations experienced a data breach in 2015. This disconnect suggests that cloud vendors may be underreporting or that attackers are simply waiting for the right moment.

Aaron Shelmire, senior threat researcher at Anomali, believes a major cloud vendor breach is almost certain. “People and businesses are relying upon cloud services more than ever,” he explains. “Cloud services are more convenient and often cheaper than alternatives. As people increase their dependence upon cloud services, the goals of malicious actors will follow the data and computing resources to the cloud.” This shift makes cloud platforms a prime target for cybercriminals.

Building on this, Alex Cruz-Farmer, VP of cloud at NSFOCUS, notes that cloud giants are already in a full-scale war with hackers. “If we look at the market today, there were several significant breaches this year and, unfortunately, I expect the trend to continue,” he warns. “Threat intelligence and technology as a whole is catching up, however we are repeatedly seeing some vendors following bad practices, which is leading to some of these breaches or attacks.”

The Growing Attack Surface: Automation and Complexity

One key driver of this cloud security risk is the increasing complexity of cloud infrastructure. As systems grow larger, companies often rely more on automation, which can introduce vulnerabilities. Cruz-Farmer points out, “What does bigger result in? More man power or more automation? More automation results in less human interaction, so one malfunction of any of these automated tools could be a goldmine for an attacker.” A single flaw in automated systems can cascade into a major breach.

For instance, a small security hole in one system could allow hackers to reverse-engineer similar methodologies used by other platform architects. This makes it “very straightforward to go deeper,” according to Cruz-Farmer. The interconnected nature of cloud services means that a cloud vendor compromise could have ripple effects across multiple clients and industries.

Silver Lining: Breaches Could Drive Better Security

However, not all is doom and gloom. Shelmire suggests that a high-profile breach might serve as the wake-up call the industry needs. “After this, cloud vendors will engage in technical advances to better protect their systems,” he predicts. “The cloud vendors will also engage marketing to use their security and survivability as differentiators.” In other words, a major incident could spur innovation and investment in stronger defenses.

This optimism aligns with broader cybersecurity predictions for 2017, which include increased collaboration and the rise of threat intelligence teams. Cruz-Farmer emphasizes, “The landscape is getting more and more aggressive, and threat intelligence teams are our real line of defense, infiltrating the networks and groups out there committing these acts.” These teams play a critical role in identifying and neutralizing threats before they escalate.

What Businesses Can Do to Mitigate Cloud Security Risks

While experts anticipate a cloud data breach 2017 may be inevitable, businesses can take proactive steps to protect themselves. Here are some recommendations:

  • Audit your cloud providers: Review their security certifications and incident response history. Look for providers that prioritize transparency.
  • Implement strong access controls: Use multi-factor authentication and limit permissions to reduce the impact of a breach.
  • Encrypt sensitive data: Ensure data is encrypted both in transit and at rest, so even if a breach occurs, the information remains unreadable.
  • Monitor for anomalies: Use threat intelligence tools to detect unusual activity in your cloud environment.

For more on enhancing your security posture, check out our guide on cloud security best practices and learn how to respond to a data breach effectively.

Conclusion: Preparing for a Cloud Vendor Breach

The consensus among experts is clear: a major cloud vendor breach is not just possible but probable in 2017. The growing reliance on cloud services, combined with the sophistication of attackers and the complexity of modern infrastructure, creates a perfect storm. Nonetheless, this challenge also presents an opportunity for the industry to strengthen its defenses and for businesses to take control of their security.

As we head into the new year, staying informed and vigilant will be key. By understanding the risks and implementing robust security measures, organizations can better protect their data—even if a cloud vendor is the next headline.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Infosecurity

Deck the Halls With Security Awareness: A Holiday Guide to Data Protection

Published

on

Deck the Halls With Security Awareness: A Holiday Guide to Data Protection

The holiday season is a time of joy, generosity, and unfortunately, heightened cyber risk. As consumers rush to buy gifts and share personal data online, cybercriminals see a golden opportunity. This is where security awareness becomes your strongest defense. Whether you run a small business or manage a large enterprise, protecting customer data should top your Christmas list.

Why is this so critical? Because the stakes have never been higher. A single data breach can shatter trust, incur massive fines, and turn a festive season into a nightmare. But with the right mindset and practices, you can keep the grinches at bay.

Why Security Awareness Matters More During the Holidays

The holiday shopping frenzy creates a perfect storm for cyber attacks. Phishing emails spike, fake websites multiply, and social engineering attempts become more convincing. Without robust security awareness, employees and customers alike can fall for these traps.

Consider this: a well-trained team is your first line of defense. They can spot suspicious activity, avoid risky clicks, and report incidents quickly. In contrast, a lack of awareness leaves your organization vulnerable to devastating losses.

Common Holiday Cyber Threats to Watch For

  • Phishing scams: Emails that mimic trusted brands like Amazon or PayPal, asking for login details.
  • Fake charities: Fraudulent donation requests that steal credit card information.
  • E-commerce fraud: Stolen payment data used for unauthorized purchases.
  • Ransomware attacks: Malware that locks systems until a ransom is paid, often targeting retailers.

Each of these threats exploits human error. Therefore, investing in security awareness training is not optional—it is essential.

Practical Steps to Boost Security Awareness This Christmas

Building a culture of vigilance starts with clear policies and ongoing education. Here are actionable steps you can take today.

Update Your Policies and Processes

Review your data protection policies to ensure they reflect current risks. For example, enforce multi-factor authentication for all accounts. Additionally, limit access to sensitive data only to those who need it. A simple audit can reveal gaps that cybercriminals might exploit.

Train Your Team on Suspicious Activity

Conduct short, engaging training sessions that focus on real-world scenarios. Teach employees how to identify phishing emails, verify requests for data, and report incidents without fear. Explore our cyber awareness training resources for practical tips.

Monitor for Insider Threats

Not all risks come from outside. Disgruntled employees or careless insiders can cause significant damage. Implement monitoring tools that flag unusual behavior, such as mass data downloads or access after hours.

How to Respond If a Breach Occurs

Despite your best efforts, incidents can happen. The key is to act swiftly and transparently. Have an incident response plan in place that includes steps to contain the breach, notify affected customers, and work with law enforcement.

Moreover, communicate openly with stakeholders. Apologize, explain what happened, and outline the measures you are taking to prevent a recurrence. This builds trust even in difficult times.

Final Thoughts: Make Security a Holiday Tradition

This Christmas, let security awareness be part of your celebrations. By protecting customer data, you are not just avoiding disaster—you are building lasting loyalty. Remember, a little vigilance today can prevent a major crisis tomorrow.

For more guidance on fraud prevention and risk management, check out our fraud prevention strategies or read about cyber security best practices. Stay safe, and enjoy a happy, secure holiday season!

Continue Reading

Infosecurity

GDPR Compliance Preparation: Why 2017 Was the Last Full Year to Get Ready

Published

on

The clock was ticking. With the General Data Protection Regulation (GDPR) set to take effect on 25 May 2018, 2017 represented the final full calendar year for businesses to achieve GDPR compliance preparation. Failure to act meant risking penalties as high as €20 million or 4% of global annual turnover—whichever proved greater. For companies that neglected data security, the message was clear: enjoy your cash while you still have it.

Why 2017 Was the Make-or-Break Year for GDPR Compliance Preparation

According to experts quoted by Infosecurity Magazine, with only 526 days remaining until enforcement, 2017 demanded urgent operational changes. Quentyn Taylor, director of information security at Canon Europe, emphasized that the biggest shift would be in the relationship between suppliers and businesses. As data processors now share similar liability with data controllers under GDPR, entire business models and pricing structures needed adaptation.

“Boards will start to take data protection seriously—something that too many have failed to do thus far,” Taylor warned. This sentiment echoed across the industry, as organizations scrambled to understand the scale of the transformation required.

The Governance Gap: Why Many Organizations Were Unprepared

Steve Holt, partner in Financial Services Advisory at EY, observed that many organizations had not established proper governance or clearly defined programs. Gap assessments were underway, but few had a handle on the full scope of change needed. “In many cases, the program is being led by legal teams,” Holt noted. “Our view is that it needs board sponsorship and a cross-functional approach.”

Holt argued that the COO was often better positioned to drive this transformation, given the importance of data, systems, and business processes. He also flagged a dangerous trend: some organizations were avoiding decisions, waiting for further regulatory clarification that was unlikely to arrive soon. “It’s important that organizations make a few assumptions and decisions, so that the program can move forward,” he said.

The Risk of Delayed Action

Holt recommended that boards openly discuss whether full compliance by May 2018 was realistic. His view: many global organizations would not be fully compliant, so prioritizing focus was essential. This meant that GDPR compliance preparation in 2017 was not just about ticking boxes but about strategic risk management.

Low Readiness Scores and the Existing Law Problem

Jonathan Armstrong, partner at Cordery, revealed that their GDPR readiness test showed alarmingly low scores. “People not having done things the existing law requires,” he said. “My gut feel is many people are leaving themselves exposed—there are only 526 days left and for most businesses there’s still a lot to do.”

Armstrong stressed that gap analysis alone was insufficient, as many organizations were not even compliant with current data protection laws. He predicted that 2017 would either be a year of hard work or a prelude to failure under the new regime.

Building Blocks for Compliance: What Experts Recommended

To move forward, Armstrong advised that businesses should have basic building blocks in place by early 2017: a process for handling a data breach and a fit-for-purpose privacy policy. Holt added that a clear governance structure was essential, covering all aspects of the business—including HR, compliance, legal, IT, marketing, operations, and procurement. He also recommended performing a thorough assessment and gap analysis to establish a future vision and strategy.

For more insights on building a robust data protection framework, check out our guide on creating a data breach response plan. Additionally, understanding board responsibilities under GDPR can help leadership take ownership of the process.

The Bottom Line: Time Was Not on Their Side

GDPR may have been 17 months away at the start of 2017, but time has a way of slipping away. The predictions from industry experts were clear: 2017 would be the year of GDPR compliance preparation—or the year organizations set themselves up for failure. Those who heeded the warnings and acted decisively stood the best chance of avoiding the steep penalties that awaited the unprepared.

As the deadline approached, the message remained the same: now or never. For businesses still on the fence, the cost of inaction was simply too high to ignore.

Continue Reading

Infosecurity

Cybercrime Monetization: How Attackers Will Make Money in 2017 and Why It’s Getting Easier

Published

on

Cybercrime Monetization: How Attackers Will Make Money in 2017 and Why It’s Getting Easier

In many Asian cultures, the number eight symbolizes wealth and prosperity. For cybercriminals, 2017 promises to be a lucky year indeed. As the digital underground evolves, attackers are finding new ways to turn breaches into profit. This article explores the key trends in cybercrime monetization for 2017, from ransomware to cloud compromises, and why the barrier to entry is dropping.

The Rise of Ransomware and Social Media as Revenue Streams

Ransomware remains a dominant force in cybercrime monetization. According to RiskIQ VP EMEA Ben Harknett, modern threat actors move fast, and seconds will count more than ever. Attack campaigns now go live within hours of account creation, lasting only a short time to evade detection.

Social media platforms are also being weaponized. Phishing and malware campaigns spread rapidly through fake profiles and malicious links. This low-cost, high-reach method allows criminals to target millions without sophisticated tools.

State-Sponsored Cybercrime: A New Level of Organization

Symantec’s Chief Strategist for EMEA, Sian John, warns that rogue nation states may align with organized crime for financial gain. The SWIFT attacks serve as a stark example, where state-backed actors stole millions by exploiting financial systems. This collaboration could lead to downtime for political, military, or financial infrastructures.

Therefore, cybercrime monetization is no longer just the domain of lone hackers. State funding brings resources and sophistication, making attacks harder to stop.

Cloud Infrastructure: The Next Big Target

Anomali senior threat researcher Aaron Shelmire predicts that cloud services will be a primary target in 2017. Security conferences have highlighted cloud-based persistence and compromise methods. Shelmire expects leading security organizations to detect malicious actors breaching cloud management infrastructure.

Malware designed to capture cloud credentials is on the rise. Once inside, attackers establish persistence through cloud management profiles, complicating intrusion timelines. This shift means cybercrime monetization will increasingly rely on cloud vulnerabilities.

Low-Sophistication Attacks Still Pay Off

Not all attacks require advanced skills. Mike Scutt, analytic response manager at Rapid7, predicts a surge in script-based malware and the use of native OS tools for execution, persistence, and reconnaissance. The dark web provides ready-made tools, lowering the entry barrier.

As a result, even less skilled criminals can profit. The websites hosting malware and phishing lures may last only hours, but the malware persists. Improved detection and response will help, but attackers adapt quickly.

How Businesses Can Defend Against Cybercrime Monetization

To counter these threats, organizations should invest in real-time monitoring and employee training. Phishing simulations and cloud security audits are essential. Additionally, adopting a zero-trust architecture can limit the damage from credential theft.

Building on this, companies must prioritize patch management and endpoint detection. As cybercrime monetization evolves, proactive defense is the best offense.

For more insights, read about ransomware prevention strategies and cloud security best practices. Also, check our guide on social engineering awareness.

In conclusion, 2017 marks a turning point in cybercrime monetization. Attackers are more organized, better funded, and leveraging low-sophistication methods with high success. Staying informed and vigilant is key to protecting assets.

Continue Reading

Trending