"Criminals Unleash a Viking Fury on CloudNordic, Obliterating Servers and Client Data."
Today, cloud computing is no longer an option but a necessity. Organizations are turning to the cloud to reduce costs and deploy resources quickly to meet business demands. This swift shift means products hit the market faster, benefiting businesses and consumers alike.
It's amazing to note the sheer scale of businesses migrating to the cloud. KPMG reports 90% of businesses see their cloud adoption as 'advanced', with 73% migrating core workloads. Gartner predicts a jump in consumer spending on public cloud services, from $490.3 billion in 2022 to $591.8 billion in 2023. This surge means more data outside traditional defenses and more responsibilities for businesses to shoulder.
With vast amounts of data transitioning to the cloud, cybersecurity cannot be an afterthought. Despite the cloud's convenience, many mistakenly believe that storing data there means they've handed over all security responsibilities to the cloud provider. This perception is a dangerous myth.
The truth is, as organizations digitize and migrate to the cloud, the threat landscape also evolves. There's a heightened need to ensure data is safe, whether at rest, in use, or in transit. A holistic approach to security is vital, covering all data across cloud infrastructures. Businesses must ensure proper configurations, setups, and data protection measures are in place.
Cloud providers are responsible for the security of the cloud itself, but you are responsible for securing anything inside of the cloud.?This includes data, user identities, and access privileges.?Cloud providers take many security measures to protect your data, but there are still risks of cyberattacks.
Unfortunately, many companies lack a deep understanding of the cloud, leaving gaps in their defenses that cyber criminals are eager to exploit. Remember, we all rely on cloud-based tools for emails, documents, and more. If unprotected, these tools become potential entry points for attackers.
In short, as the world moves to the cloud, cybersecurity isn't just a requirement—it's a mission-critical aspect. The choice is clear: either adapt and protect or risk the dire consequences.
Here’s a case in point. On August 18th, Denmark's cloud host, CloudNordic, fell victim to a devastating ransomware attack. The aftermath? Most of their customers' data hosted with them has been lost.
领英推荐
Announced on their website, CloudNordic revealed the attack left them inoperable. Everything from their websites to email systems, customer servers, and more were shut down by yet-to-be-identified cybercriminals.
CloudNordic has indicated they can’t and won’t pay the ransom demanded by the cybercriminals behind the intrusion. The company's IT team, aided by external experts, have been tirelessly working to assess and recover what they can. Unfortunately, they found most of the data irretrievable. Any customer not directly contacted by CloudNordic should assume their data has been lost.
?The company believes the attack's timing coincided with their servers moving between data centers. Infected systems, connected during this period, possibly gave the attackers their entry point, eventually encrypting all server disks, including primary and secondary backup systems.
Interestingly, AzeroCloud, a sister cloud host owned by the same parent company as CloudNordic, suffered an identical attack, indicating a broader targeting strategy.
I would dare say that this could literally spell the end for some of the businesses that put their trust in these cloud providers. As I stated, it was incumbent on them to protect their valuable data. So let me restate this again; you are responsible for protecting data that is stored in the cloud from loss, corruption, theft, and compromise. Approaches to ensuring cloud data security may include technology to protect data from cyber-attack, cyber recovery solutions to recover data after an attack, backup and recovery technology to restore data that is lost or corrupted, and disaster recovery solutions to provide access to data after an outage, a natural disaster or a cyberattack. This sounds daunting right? How can this be accomplished?
Here’s the answer. Dell Technologies has a number of hardware and software solutions for cloud data security, including:
With?Dell Technologies Data Protection?solutions, organizations can be prepared for a?Positive Outcome?in their journey to the cloud.