The question is not if an attack will be successful, but when and how much damage it will do. It is why organizations should always operate under the assumption that their always under attack.

October 6, 2014

3 Min Read
Attackers will attack you in the cloud in the data center or both
Attackers will attack you in the cloud, in the data center or both.

By Lori MacVittie 1

Hardly a week goes by of late without the news of a new vulnerability or a new breach somewhere. Attackers these days are somewhat indiscriminate. They’ll attack you in the cloud, in the data center or both. The goal is not always to extract profitable data, but exfiltrate data that can be used to extract profitable data from some other app. Everything is connected to everything else these days, after all, and obtaining customer credentials for a cloud-based marketing app may net the bad guys access to an on-premise app that can ultimately be the point of injection for malicious code that opens the door to the network.

The reality of today is that you should assume you are always under attack, because you probably are. I can visit the log of my home office router right now, and I guarantee I will find a variety of attacks that have been successfully detected and rejected. Any organization that tells you they don’t detect and reject thousands of attempted attacks a day is probably lying.

The question is not if an attack will be successful, but when and how much damage it will do. The key to mitigating a successful attack is to have a process to follow when it happens, because eventually it will.

Talking with cloud notable leaders this past week, the conversation turned to the increasing number of organizations that are carefully weighing the cost of investing in security solutions versus the benefits of having a well-defined breach response process in place. Many are moving to focusing on the response process.

They see the writing on the wall. No one is really safe anymore. Attacks are constant, and even a blind squirrel will find a nut once in a while. Orphaned accounts, social engineering, web platform vulnerabilities and a lack of robust security services available to cloud-hosted applications only serve to increase the risk and reinforce the need to have a well-defined security response process in place. Especially with the constant migration of applications to the cloud.

A recent Tata Consulting survey on the state of cloud application adoption shows that organizations are increasing their cloud footprint across the board. While the average remains at about 24 percent and few have reached critical mass (greater than 50 percent), the reality is that applications are moving to the cloud more and more frequently. That means more applications with fewer protections between them and the bad guys. Couple that with the standard growth of applications — doubling every four years according to IDC — and the ability to detect and stop every single threat is nigh unto impossible.

Someone or something will succeed. It’s time to start making sure your response strategy is ready for it.

Do you work under the assumption that you’re always under the attack? Are you forthcoming with the number of attacks hitting your organizations?

Read more about:

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like