Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Cyber attacks increases with growing remote workers

Cyber attacks increases with growing remote workers

There was a 148% rise in remote workers due to the COVID-19 pandemic which resulted in a 161% increase in visits to high-risk apps and websites, according to a report.


Seda Nur Cinar Seda Nur Cinar
August 24, 2020
3 min read
Cyber attacks increases with growing remote workers

The August 2020 Edition of the Cloud and Threat Report of Netskope which analyzes the interesting trends on enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers has been released. The report shows that there was a 148% rise in remote workers due to the COVID-19 pandemic—which resulted in a 161% increase in visits to high-risk apps and websites, as personal use of managed devices nearly doubled.

The effects of the abrupt shift to remote work in 2020

The Netskope Cloud and Threat Report is produced by Netskope Threat Labs, a team composed of the industry’s foremost cloud threat and malware researchers who discover and analyze the latest cloud threats affecting enterprises. The report was based on anonymized data collected from the Netskope Security Cloud platform across millions of users.

Ray Canzanese, threat research director at Netskope, said,

Ray Canzanese, threat research director at Netskope
Ray Canzanese, threat research director, Netskope

“The abrupt shift to remote work in 2020 sent a shockwave through organizations, as people found work and personal lives blended unlike ever before. While many companies rose to the challenge to embrace cloud-based collaboration tools, we also found increased risk as employees used work devices for personal reasons. Organizations must tackle this problem head-on by prioritizing threat protection and ensuring safe cloud and web access through methods like strong authentication and access controls, data and threat protection, as well as zero-trust network access to private apps in data centers and public cloud services. Enacting measures like this will reduce exposure of apps, cloud-enabled threats, unintentional data movement, and limit network lateral movement.”

64% of workers are now remote

With the COVID-19 pandemic, as 64% of workers are now working remotely. According to the report, along with this increase in remote work came to an 80% increase in the use of collaboration apps as remote workers seek to remain connected with their colleagues, and the total number of cloud apps being used in the average enterprise increased to over 7,000 in the largest enterprises.

Another important finding is that personal use of devices increased by 97% and the use of risky apps and websites increased by 161%. Netskope Threat Labs found that there is a 600% increase in the amount of traffic to websites hosting adult content and that 7% of all users uploaded sensitive corporate data to personal instances of cloud apps—putting this data at risk of inappropriate use and theft.

The report also determines the top 5 most common types of sensitive data being uploaded to personal instances as below:

  1. Protected Health Information (PHI)
  2. Personally Identifiable Information (PII)
  3. General Data Protection Regulation (GDPR)
  4. Source Code
  5. Company Confidential Information

While the cybercriminals’ adoption of the cloud as an attack vector continues to grow, cloud phishing and cloud malware delivery uncovered as the two most common techniques. In 2020, 63% of malware was delivered over cloud applications—a four-point increase from the end of 2019. The top cloud apps and services from which Netskope blocked malware downloads were:

  1. Microsoft Office 365 OneDrive for Business
  2. Sharepoint
  3.  Box
  4. Google Drive
  5. Amazon S3

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Netskope
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Primary Hosting to acquire Mobile Agent Now

Primary Hosting to acquire Mobile Agent Now

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming
  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.