3 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
A recent AWS report identifies major security issues in cloud systems, with human errors and operational misconfigurations leading to data breaches. Despite widespread cloud adoption, concerns about cybersecurity and integration challenges persist among businesses. The report underscores the need for organizations to address these vulnerabilities as they transition to cloud-based solutions.
If you do, here's more
A recent AWS report highlights key security failures in cloud environments, revealing that vulnerability exploitation accounts for 24% of breaches, while compromised credentials make up 20%. Simple operational errors and human factors are significant contributors to data breaches. The report, based on a survey of 2,800 technology and security firms across 13 countries, shows that nearly all organizations (99%) are building applications in the cloud, with on-premises systems declining rapidly. For instance, the share of customer-facing applications on-premises is expected to fall from 51% to 40% next year, while cloud usage will rise from 70% to 77%.
Despite the rapid adoption of cloud technologies, 40% of businesses cite cybersecurity and privacy concerns as their top barrier to full integration. The complexities of connecting older systems with new cloud solutions also pose challenges, affecting 38% of organizations. Alarmingly, around 80% reported a data breach in the past year, with common issues including physical theft (19% in cloud), misconfiguration (16% in cloud), and compromised credentials (20% in cloud). The impact of these breaches is serious, with over a third of organizations experiencing operational downtime, reputational damage, or data loss.
New tactics from attackers, such as Adversary-in-the-Middle phishing, highlight the evolving threat landscape. Cybercriminals are increasingly exploiting stolen credentials, especially through remote access solutions like VPNs. They often bypass multi-factor authentication by using techniques that blend in with legitimate processes. The report underscores the importance of not just migrating to the cloud but also ensuring robust partnerships with reliable providers and addressing human errors consistently. As multi-factor authentication becomes more prevalent, attackers may shift focus to non-human identities, which typically have weaker security.
Questions about this article
No questions yet.