Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

Cloud Apps Security

Today, more than ever before, employees are working while on-the-go. The ease with which a worker can enjoy a coffee-café latte in one hand and click “send” with the other is made possible by the explosion of mobile devices and mobile cloud-based applications. According to IDC, more than 96.2 million mobile employees are taking advantage of the mobility offered by today’s technologies.

Cloud-based Apps and the Mobile-Worker

To best protect these users while mobile, companies need to change their security strategy.

Traditionally, businesses have invested heavily in securing their infrastructure and endpoints— the security of the data lies within the four walls.

These walls quickly become ineffective when using cloud-based apps. Your firewall and network monitoring solutions? Traffic flies right through. Endpoint software? On a phone? Even if AV companies had software to install, will your users even install it?

Last, migration to cloud apps makes passwords (and related authentication solutions) the key to any security strategy. A loss of a password to an attacker can be detrimental. Regardless of whether they are using laptops, tablets, or phones, employees are using passwords that need to be protected. Passwords have become the key battleground for cloud-enabled organizations.

Mobile Worker Attack Methods

We’ve seen a sharp increase in two types of attacks focused on mobile workers that are trying to steal credentials. In addition, mobile devices continue to be prime targets for Malware attacks.

Proximity-focused attacks: In this type of attack, a cybercriminal creates a fake wireless access point in a public area, such as an airport, in the hopes of tricking their victims into connecting. Mobile workers searching through the longlist of airport Wi-Fi options until they find one that doesn’t require a password may be susceptible to this attack method. Hackers will set up a fake network service in hopes a user will click on it, giving the attacker access to much of the sensitive information and credentials from the device.

Phishing attacks: With a phishing attack, a cyber-criminal usually generates a fake email pretending to be someone they’re not and requests money, passwords or account numbers to take over a victim’s finances, steal sensitive information or hold their account hostage until a ransom is paid. While mobile devices receive phishing attacks via email, they can also receive them from text messages, communications apps, social media and practically anywhere a mobile device can receive a message. This not only increases the number of phishing attacks on mobile devices but the susceptibility of users falling victim to this type of attack.

Malvertising and malware attacks: We have observed a sharp increase in attackers buying malicious ads and getting them placed on high-traffic websites. These ads find Vulnerabilities in browser software and then exploit the system to install ransomware or more persistent malware. According to Nokia’s global Threat Intelligence Report, 2016 saw the highest level of mobile device malware infections since 2012 with smartphone malware infections rising nearly 400 percent.

The explosion of mobile workers is pushing companies to develop cloud-based security for their mobile devices. In the next article, I’ll talk about what those security strategies should look like.

By Todd O’Boyle

Couchbase

Episode 13: How Developers will Revolutionize Digital Transformation Efforts Despite Challenges

How Developers will Revolutionize Digital Transformation Efforts In February 2021 Couchbase released the results of a survey that showed how developers play a key role in helping organizations meet their digital transformation goals despite facing ...
Martin Mendelsohn

How Will COVID-19 Impact Security Talent?

New Security Talent As we emerge from the era of COVID-19, unemployment will recede, and new jobs will be created more rapidly than jobs were lost between March and May of this year. We’re already ...
Gary Taylor

Addressing 5 Key Risks for the Hybrid Worker

Hybrid Worker Risks Organizations are under pressure to secure their remote workers, but they are also worried about the potential impact on user experience. Can they have it both ways without compromise? The pandemic has ...
Kamal Maggon

Mining Business Value – Accelerating a US Company’s Cloud Transformation

Mining Business Value Traditional industries like mining have been slow to adapt to changing IP technology.  Of course, coal and other mining types have adopted new technologies starting with mechanical drills powered by pistons, then ...
EV Sales

Growth of Electric Vehicles – Heading In The Right Direction

Growth of Electric Vehicles The global electric vehicle market is projected to reach $802.81 billion by 2027, registering a CAGR of 22.6%.1 The highest revenue contributor was Asia-Pacific, which is estimated to reach $357.81 billion ...

PROXY SERVICES

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Smartproxy

    Smartproxy

    Smartproxy is a rising star in the constantly growing proxy market. Smartproxy offers awarded customer service, impressive performance, and is serious about your anonymity (yes, cybersecurity matters). The latest features developed by Smartproxy are 30 minute long sticky sessions and Google Proxies. Rumor has it, the latter guarantee 100% success rate

  • Bright Data

    Bright Data

    Bright Data’s network is one of the most robust of its kind globally. Here are its stark advantages: Extremely stable connection for long sessions (99.99% uptime guaranteed). Free to integrate with our Proxy Manager which allows you to define custom rules for optimized results. Send unlimited concurrent requests increasing speed, cost-effectiveness, and overall efficiency.

  • Rsocks

    Rsocks

    RSocks team offers a huge amount of residential plans which were developed for plenty of tasks and, most importantly, has been proved to be quite efficient. Such variety has been created on purpose to let everyone choose a plan for a reasonable price, online, rotation and other parameters.

  • Storm Proxies

    Storm Proxies

    Storm Proxies' network is optimized for high performance and fast multi-threaded tools. You get unlimited bandwidth. No hidden costs, no limits on bandwidth. Try Storm Proxies 100% Risk Free. If you are not happy with the service email us within 24 hours of purchase and we will refund you.