IT disaster recovery, cloud computing and information security news

The 2017 Cloud Security Report: public cloud platforms more secure than on-premise

Alert Logic has published its 2017 Cloud Security Report. The report analyzes customer data from more than 3,800 Alert Logic cloud, on-premises and hybrid cloud customers over an 18-month period, from August 1, 2015 to January 31, 2017.   Report findings are based on an analysis of more than 2 million security incidents captured in Alert Logic intrusion detection systems and escalated by Alert Logic Security Operations Center (SOC) analysts to its customers over 555 days, 32.5 million events associated with those incidents and 147 petabytes of security data.

“We focused our analysis on incident types and the workloads and environments most at risk,” said Misha Govshteyn, Senior Vice President of Technical and Product Marketing. “Cyber attackers continue to seek the weakest spots in network defenses and businesses need to understand how they are refocusing to take advantage of the changing attack landscape.”

Key findings in the report include the following:

Web applications are the soft underbelly of organizations
Web application attacks accounted for 73 percent of all the incidents flagged in the 18-month evaluation period. Web application attacks affected 85 percent of all Alert Logic customers, with injection-style attacks such as SQL injection leading the pack.

Pure public cloud installations experienced the fewest security incidents
On average, customers running applications on public cloud platforms experienced 405 security incidents over the 18-month period while on-premises customers experienced a 51 percent higher rate of security incident escalations (612), hosted private cloud 69 percent higher (684) and hybrid cloud 141 percent higher (977).

Server-side ransomware represented only 2 percent of total incidents
While ransomware gets much mindshare in the cyber security industry and in media headlines, it accounted for only a small number of observed security incidents in the data set.

Bad actors like content management systems and e-Commerce platforms
Vulnerabilities in ubiquitous third-party web application components, insecure coding practices and increases in exploit automation make content management systems and e-commerce platforms rich hunting grounds for hackers targeting web applications.  Attacks targeting Joomla accounted for 25 percent of total web application attacks observed followed by WordPress with 10 percent and Magento with 7 percent.

To download a full copy of the 2017 Cloud Security Report, click here (registration required).



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

   

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.