[ad_1]
According to Netskope, more than 400 different cloud applications will deliver malware in 2022. That’s nearly triple what he did the year before, and his 30% of all cloud malware downloads in 2022 came from Microsoft OneDrive.
Cloud applications are widely used by enterprises. This is a fact that attackers cannot ignore. Attackers see these applications as ideal places to host malware to cause harm. Researchers examine how these cloud security trends are changing and advise organizations on how to improve their security posture based on those changes.
Ray Canzanese, Threat Research Director at Netskope Threat Labs, said: “Therefore, more organizations, both corporate and personal instances, can inspect all HTTP and HTTPS traffic, including that of popular cloud applications, for malicious content. It’s essential.”
More uploads to cloud apps mean more downloads from malware delivery
The most significant change in cloud application usage in 2022 compared to 2021 is the significant increase in the percentage of users uploading content to the cloud. Over 25% of his users worldwide upload documents to Microsoft OneDrive daily, 7% to Google Gmail and 5% to Microsoft Sharepoint.
Significant growth in active cloud users across a record number of cloud applications will see cloud malware downloads grow significantly in 2022 from 2021, after remaining roughly flat in 2021 compared to 2020 increased to
The correlation between uploads and downloads among the most popular apps is no accident. Nearly one-third of all cloud malware downloads came from Microsoft OneDrive, with Weebly and GitHub coming closest among cloud apps at 8.6% and 7.6%, respectively.
Cloud-delivered malware is more prevalent than web-delivered malware
Over the past few years, the industry has increasingly relied on cloud applications and cloud infrastructure to support business operations. This trend has been further accelerated by the COVID-19 pandemic and the global shift to hybrid work.
As a result, cloud-delivered malware has become an ever-higher percentage of all malware distribution, especially in certain geographies and industries.
In 2022, several regions saw significant increases in the overall proportion of cloud-delivered versus web-delivered malware compared to 2021.
- Australia (50% in 2022 compared to 40% in 2021)
- Europe (42% in 2022 compared to 31% in 2021)
- Africa (42% in 2022 compared to 35% in 2021)
- Asia (45% in 2022 compared to 39% in 2021)
Cloud-delivered malware has also become dominant globally in certain industries. In particular, they tend to:
- Telecom (81% in 2022 compared to 59% in 2021)
- Manufacturing (36% in 2022 compared to 17% in 2021)
- Retail (57% in 2022 compared to 47% in 2021)
- Healthcare (54% in 2022 compared to 39% in 2021)
Cyber ​​Preparedness: The Establishment of Remote Workers
Companies have made quite a few adjustments to allow remote and hybrid workplaces to thrive. While some industries have tried to bring employees back to the office more frequently in 2022, remote work options remain mostly open.
The user distribution (the ratio of the number of users on the Netskope platform to the number of network locations from which those users’ traffic originates) is 66%, the same percentage as at the start of the pandemic two years ago.
Remote and hybrid work dynamics address multiple cybersecurity issues, such as how to securely provide access to the company resources users need to do their jobs, and how to provide users with access to the Internet in a scalable and secure manner. continues to pose challenges.
Netskope recommends that organizations take the following actions to avoid increased risk of security incidents due to cloud and web-delivered malware:
- Adapt policies based on device, location, and risk, and apply granular policy controls to restrict data flow, including to/from apps, between corporate and personal instances, between users, and to the web To do.
- Deploy multi-layered inline threat protection for all cloud and web traffic to block inbound and outbound malware communication.
- Enable multi-factor authentication for unmanaged enterprise apps.
[ad_2]
Source link