Cloud Resource: New Delhi According to an analysis conducted by a global company, cloud resources are the “biggest targets” for cyberattacks in India.
According to a statement, Thales has announced the release of the 2024 Thales Cloud Security Study, its yearly evaluation of the most recent trends, threats, and emerging risks related to cloud security, based on a survey of around 3,000 IT and security professionals across 18 countries in 37 industries.
“The study was based on a global survey of 2,961 respondents, aimed at professionals in security and IT management,” it stated.
The research “identifies cloud resources as the biggest targets for cyberattacks in India” .
It continued, saying that expenditure on cloud security “tops all other security spending categories” currently.
According to over half of the respondents in India, all corporate data kept on cloud storage platforms is sensitive. In addition, 37% of the participating organizations in the survey stated that their cloud data was compromised, with 14% having done so in the previous year.
Additionally, nearly half of organizations worldwide acknowledge that managing compliance and privacy in the cloud is more difficult than doing so on-premises, and 35% of Indian organizations recognize the significance of digital sovereignty initiatives as a way to future-proof their cloud environments.
According to the report, the most common underlying causes of these breaches are still human error and misconfiguration, which are followed by exploiting known vulnerabilities, exploiting vulnerabilities that were not previously discovered, and failing to employ multi-factor authentication.
Since many organizations still view using the cloud as strategically important, cloud resources have emerged as the main targets for cyberattacks. In India, the most common attack categories are cloud storage, SaaS apps, and cloud management infrastructure.
“As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines,” the statement continued.