90 % of IT leaders and security leaders said their organization witnessed an electronic attack during the past year, according to a report issued by Rubrik.
“Many organizations that are transferred to the cloud assume that their service providers will deal with security,” said Joe Hledk, President of Rubrik Zero Labs. “The continued ransom attacks, along with the exploitation of hybrid cloud weaknesses, shows that the threat representatives are always a step forward. Companies must take measures and adopt the attacker's mentality by identifying or protecting-not the most valuable data before they are late. The need for a central security strategy for data, control, and rapid control was never more.”
Nearly five organizations in the world witnessed more than 25 electronic attacks in 2024 alone, according to what he mentioned and security leaders, at a rate of at least one breach every week.
The most common attack tankers were cited are data violations (30 %), harmful programs on devices (29 %), cloud breasts or saas (28 %), hunting (28 %), and internal threats (28 %). The consequences of these attacks include:
40 % of the respondents have reached increased security costs. Notice 37 % reputation damage and customer confidence loss. 33 % of a forced driving change witnessed after the internet incident.
Organizations are still reluctant to adopt the cloud
Although the adoption of the cloud has become the cornerstone of modern commercial practices, some organizations hesitate to adopt this entire shift. Challenges, such as understanding application dependencies, comparing local costs and cloud costs, and assessing technical feasibility, often serve as important barriers.
90 % of information technology leaders and security leaders on the management of mixed cloud environments, and half of the IT leaders say that most of their work burdens are now based on the cloud.
Many companies housed wrong concepts about the inherent safety of cloud services, assuming that cloud service providers will bear full responsibility for protecting their data. This dependence can lead to a false feeling of safety, which leaves organizations vulnerable to risks, such as data or loss violations, especially if something happens.
35 % of respondents are cited by providing data through these diverse ecosystems as a higher challenge, followed by the lack of central administration (30 %), lack of vision and control of cloud -based data (29 %).
36 % of sensitive files are classified as high risks and largely consist of personal identification information (PII), such as social security numbers and phone numbers; Followed by digital data and business data, such as intellectual property and source symbol.
Run payments remain a common way to recover data
Among the organizations that witnessed a successful ransom attack last year, 86 % admitted that they had paid a ransom to recover their data. 74 % said that the actors in the threat were able to partially compromise on the regulatory and recovery systems in part, while 35 % said that their systems were completely dangerous.
With 92 % of organizations that are used between two and five cloud and Saas platforms, attackers take advantage of identity weaknesses, access to move sideways and ransom attacks.
The internal threats, which are often moved by the accreditation data at risk, have been cited by 28 % of IT leaders, confirming the increasing difficulty in maintaining strong access controls across distributed systems.
The researchers have revealed that 27 % of high-risk sensitive files contain digital data such as the keys to the application programming interface, user names and account numbers-Exactly a type of active bodies of information threats that seek to kidnap identities and infiltrate critical systems.