Many businesses are still failing to secure their cloud data

An abstract image of cloud storage.
(Image credit: Shutterstock/Marko Aliaksandr)

Despite the unabated onslaught of cyber-attacks on cloud computing providers, a vast majority of businesses still fail to encrypt their sensitive data housed in public clouds.

The 2021 Thales Global Cloud Security Study based on a survey of over 2,600 executives from 16 countries reveals that while 40% of organizations have experienced a cloud-based data breach in the past 12 months, 83% still keep at least half of the sensitive data unencrypted.

As expected, the survey revealed that cloud adoption is on the rise, with 57% of the respondents sharing that they make use of two or more cloud infrastructure providers. Moreover, almost a quarter (24%) of organizations admitted that the majority of their workloads and data now reside in the cloud.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“Protecting customer data is always the priority, and organizations should strongly consider reviewing their strategies and approaches to proactively protect data in the cloud,” observes Fernando Montenegro, Principal Research Analyst, Information Security at 451 Research, which conducted the survey on behalf of Thales.

Poor protection

Despite the fact that an increasing number of businesses are trusting their sensitive data to the cloud, only 17% shared that they encrypt more than half of the data they store in the cloud. More worryingly, this figure drops to 15% where organizations have adopted a multi-cloud approach. 

Even where businesses protect their data with encryption, 34% said they leave the encryption keys under the control of the service providers. 

As further proof of the poor data security practices, nearly half (48%) of the respondents admitted that their organization doesn’t have a Zero Trust strategy, and a quarter (25%) said they aren’t even considering adopting one. 

“A robust security strategy is essential to ensuring data and business operations remain secure. With nearly every business reliant on the cloud to some extent, it is vital that security teams have the ability to discover, protect, and maintain control of their data,” concludes Sebastien Cano, Senior Vice President for Cloud Protection and Licensing activities at Thales.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Holographic representation of cloud computing over open businessman&#039;s hand
AWS, Azure and Google Cloud credentials from old accounts are putting businesses at risk
Ransomware
Ransomware defenses are being weakened by outdated backup technology, limited backup data encryption, and failed data backups
API
Businesses are being plagued by API security risks - with nearly 99% affected
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
Cloud, networking and internet
Under the hood of data sovereignty
Cyber-security
Many firms see cyberattacks as their top business concern this year
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Scam alert
A new SMS energy scam is using Elon Musk’s face to steal your money
Representational image of a cybercriminal
Allstate sued for exposing personal customer information in plaintext
Latest in News
A stressed employee looking over some graphs
UK workers are spending more than one day per week tracking down information
Vision Pro Metallica
Apple Vision Pro goes off to never never land with Metallica concert footage
Mufasa is joined by another lion, a monkey and a bird in this promotional image
Mufasa: The Lion King prowls onto Disney+ as it finally gets a streaming release date
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
An Nvidia GeForce RTX 4060 on a table with its retail packaging
Nvidia RTX 5060 GPU spotted in Acer gaming PC, suggesting rumors of imminent launch are correct – and that it’ll run with only 8GB of video RAM
Indiana Jones talking to a friend in a university setting with a jaunty smile on his face
New leak claims Indiana Jones and the Great Circle PS5 release will come in April