Data Breach Fatigue [dey-tuh, dat–uh, dah-tuh] [breech] [fuh–teeg]
a feeling of utter weariness and discontent resulting from the occurrence of multiple cyber attacks within a short period of time.
Cyber attacks are happening so frequently that the IT community has created a buzzy term to describe the public’s indifference to them – data breach fatigue. But it’s time to wake up to the importance of cloud security. According to research by the Ponemon Institute:
- Hackers have exposed the personal information of 110 million Americans – roughly half the nation’s adults – in the last 12 months alone.
- The number of hacked accounts is up to 432 million.
As we continue to manage our lives online via shopping, banking and socializing, more of our personal data is being stored both in the cloud on smart phones, laptops, work PCs, website servers and countless retailers’ computer networks. And as technology becomes more sophisticated, so do hackers. In fact, they often “stake out” a corporate network for years before being noticed. It took months for companies such as Target and eBay to notice that their databases have been hacked, impacting 70 million and 145 million of their customers respectively.
Cloud Security Solutions
It’s not unusual for hackers to create malware to attack specific organizations. While complete immunity from hacks is almost impossible, it’s critical for companies to partner with an experienced cloud solution provider (CSP) who can provide proven cloud security measures to protect business-critical applications, confidential data and the underlying infrastructure that supports those applications. According to The Alert Logic Cloud Security Report, an overall cloud security solution should address the following applications.
- Network – Firewall, intrusion detection and vulnerability scanning provide detection and protection, while also offering visibility into the security of a cloud environment.
- Compute – Anti-virus, log management and file integrity management protect against known attacks, provide compliance and security visibility within an environment.
- Application – A web application firewall will protect against one of the largest threats to the cloud – web application attacks. Encryption technologies are available for data-in-flight and data-at-rest.
- Application stacks – Security information event management (SIEM) can address big data security challenges by collecting and analyzing data sets. When deployed with the right correlation and analytics, this can deliver real-time insights into events, incidents and threats across a cloud environment.
The design and configuration of these types of services will be determined by an organization’s specific requirements, including security and compliance standards, application and data sensitivity, risk assessment and so forth.
While some publications are touting 2014 as “the year of the hack,” HOSTING believes that knowledge is power. Which is why HOSTING and long-time partner Alert Logic released The Alert Logic Cloud Security Report. This report lists trends that threaten online and cloud security as well as essential elements to include in a security solution. You can also register for our on-demand webinar that walks you through the report.