Cloud

11/10/2016
11:00 AM
50%
50%

Free Cloud Storage Putting Small Business Data At Risk

SMBs are putting sensitive information at risk by using free cloud storage services that lack strong security measures, new research shows.

Nearly 25% of small- to midsized-sized businesses (SMBs) continue to use free cloud storage services despite warnings from security experts, according to new research from Clutch.

Researchers polled 293 SMBs using at least one cloud storage platform; 51% work at companies with 50-500 employees. They discovered that 11% of SMBs store banking data and 14% store medical records in free cloud storage services. 

Security is the top consideration for SMBs looking for cloud storage providers, researchers say. The majority (87%) of respondents believe the cloud is very or somewhat secure. One-quarter still only use a free version of cloud storage services.

There seems to be a gap in understanding, Clutch says, and using free cloud storage is an irresponsible businesses practice. The biggest risk to these services, experts say, is human error. 

"A lot of these things aren't just magic," said Mark Estes, regional director of sales at Qubole, in a statement. "My data isn't suddenly secure just because I put it in the cloud. There's a lot of things you do. The cloud enables the security of data as long as you do things correctly."

Read the rest of the report, and additional commentary, at Clutch

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
socialunblock
50%
50%
socialunblock,
User Rank: Apprentice
6/12/2018 | 2:27:38 AM
icloud storage
iCloud is the best for online storage. Gmai login is excellent too.
socialunblock
50%
50%
socialunblock,
User Rank: Apprentice
6/12/2018 | 2:27:18 AM
icloud storage
iCloud is the best for online storage. Gmai login is excellent too.
umutarcn
50%
50%
umutarcn,
User Rank: Apprentice
1/8/2017 | 8:53:28 PM
Details and source : PNG, Love
Thank you (Gracias)!
Row3n
50%
50%
Row3n,
User Rank: Strategist
1/6/2017 | 2:17:11 AM
Hi
I can see why small businesses are using free cloud storage services to be honest. You can't expect these small companies to be able to fork out that kind of money for their own servers and networks. Unfortunately, they will have to if they don't want their finance and accounting information to be hacked into though!
Microsoft Fixes 11 Critical, 39 Important Vulns
Kelly Sheridan, Staff Editor, Dark Reading,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12580
PUBLISHED: 2018-06-19
library/DBTech/Security/Action/Sessions.php in DragonByte vBSecurity 3.x through 3.3.0 for vBulletin 3 and vBulletin 4 allows self-XSS via $session['user_agent'] in the "Login Sessions" feature.
CVE-2018-12578
PUBLISHED: 2018-06-19
There is a heap-based buffer overflow in bmp_compress1_row in appliers.cpp in sam2p 0.49.4 that leads to a denial of service or possibly unspecified other impact.
CVE-2018-1061
PUBLISHED: 2018-06-19
python before versions 2.7.15, 3.4.9, 3.5.6 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.
CVE-2018-1073
PUBLISHED: 2018-06-19
The web console login form in ovirt-engine before version 4.2.3 returned different errors for non-existent users and invalid passwords, allowing an attacker to discover the names of valid user accounts.
CVE-2018-12557
PUBLISHED: 2018-06-19
An issue was discovered in Zuul 3.x before 3.1.0. If nodes become offline during the build, the no_log attribute of a task is ignored. If the unreachable error occurred in a task used with a loop variable (e.g., with_items), the contents of the loop items would be printed in the console. This could ...