Cloud Compromise Costs Organizations $6.2M Per Year

Cloud Compromise Costs Organizations $6.2M Per Year
Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.

Cloud compromise is expensive, and its costs continue to rise. A new report finds compromised cloud accounts led to an average financial loss of $6.2 million for surveyed organizations, or an average of 3.5% of their total revenues over the past 12 months.


To learn more about how businesses protect confidential data in the cloud, the Ponemon Institute, commissioned by Proofpoint, surveyed 662 IT and IT security pros in the US. They discovered while cloud-focused attacks are expensive for victims, most lack processes for how cloud-based resources are evaluated for security or who is responsible for vetting them.


In addition to the hours spent responding to an incident, post-breach financial losses can stem from business process workaround, fines, legal fees, consultants and/or lawyers, managed security service providers (MSSPs), notifying the businesses and people whose information was exposed, loss of customers and business partners due to reputational damage, and application downtime. Organizations experience an average of 138 hours of application downtime per year.


Half of the respondents reported an increase in the frequency of cloud account compromises in the past year, and 53% saw an increase in the severity of these incidents. In the past year, respondents reported 19 cloud compromises, on average. When they led to exposure of sensitive data, these compromises could cause data theft, business disruption, and reputational damage.


Three-quarters of respondents said they believe the use of cloud apps and services without IT approval is a "serious risk," though many report this happens within their own organizations.


The IT team has very little control over corporate data in the cloud, researchers report. An average of 42% of corporate data is ..

Support the originator by clicking the read the rest link below.