Friday , May 9 2025

Only 45% of cloud data is currently encrypted

According to Thales, the number of businesses that suffered a data breach in their cloud environment last year increased to 39%, up from the 35% reported in 2022.

Cloud environments security

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

55% of respondents stated that human error is the main cause of cloud data breaches. This comes as businesses reported a dramatic increase in the level of sensitive data stored in the cloud. 75% of businesses said that more than 40% of data stored in the cloud is classified as sensitive, compared to 49% of businesses this time last year.

Software as a Service (SaaS) applications were identified by 38% of respondents as the primary target for hackers, while cloud-based storage closely followed at 36%.

Lack of control over encryption keys

The study revealed that despite the growing amount of sensitive data being stored in the cloud, the utilization of encryption remains surprisingly low. Only 22% of IT professionals reported that more than 60% of their sensitive data in the cloud is encrypted. According to the findings, on average, only 45% of cloud data is currently encrypted.

In addition, the study revealed that businesses have limited control over their encryption keys. Surprisingly, only 14% of the participants stated that they had full control over all the keys to their encrypted data in their cloud environments. In addition, almost 62% say they have five or more key management systems – creating increased complexity when securing sensitive data.

ALSO READ:

Ransomware tracker: The latest figures-July 2023

Surge in SaaS App adoption

The adoption of multicloud is experiencing a significant surge, with over 79% of organizations now utilizing multiple cloud providers. Notably, it’s not just infrastructure that is experiencing this growth. The use of SaaS apps is also on the rise significantly. In 2021, 16% of respondents reported their enterprises utilizing 51-100 different SaaS applications, while in 2023 this percentage increased to 22%.

Although the use of cloud technology continues to grow, there is still a notable obstacle that persists. 55% expressed that managing data in the cloud is more complex than in on-premises environments – up from 46% compared to the previous year.

Respondents are also highly concerned about digital sovereignty. 83% expressed concerns over data sovereignty, and 55% agreed that data privacy and compliance in the cloud has become more difficult.

Maintaining control and security in cloud environments

Strong security practices are crucial in mitigating data breaches, with identity and access management (IAM) playing a significant role. Encouragingly, the adoption of robust multifactor authentication (MFA) has risen to 65%, indicating progress in fortifying access controls.

It is quite surprising that only 41% of organizations have incorporated zero trust controls into their cloud infrastructure. Moreover, an even smaller percentage (38%) utilizes these controls within their cloud networks. These statistics highlight the need for greater emphasis on adopting comprehensive security measures to effectively safeguard sensitive data and enhance overall cyber security resilience.

Organizations need easy access to on-demand IT infrastructure and services in a dynamic multicloud landscape, according to Sebastian Cano, SVP for Cloud Protection and Licensing activities at Thales.

When handling sensitive data, it’s very important to consider cloud environments as an extension of the existing infrastructure for control and security purposes. Customer control of encryption keys is important because it allows organizations to benefit from the cloud’s scalability, cost efficiency, and accessibility while ensuring the highest level of integrity and confidentiality for their valuable information, said Cano.

Check Also

Data Center

Amazon Follows Microsoft’s Lead, Halts Some Data Center Deals

Amazon has paused some data center lease negotiations for its cloud division, particularly in international …

Leave a Reply

Your email address will not be published. Required fields are marked *