2022 Cloud Misconfigurations Report

string(7) "Country"
string(7) "Country"
string(14) "Business Email"
string(14) "Business Email"
string(9) "Full Name"
string(9) "Full Name"
string(13) "Company Phone"
string(13) "Company Phone"
string(17) "Postal / ZIP Code"
string(17) "Postal / ZIP Code"
string(9) "Job Title"
string(9) "Job Title"

In the latest edition of our Cloud Misconfigurations Report, we review data from publicly disclosed breaches that occurred over the last year, as well as data from our internet scanners and honeypots. As it turns out, many breaches were caused by avoidable circumstances. Below is a preview of our findings.

• Breaches can happen anywhere
Data breaches occurred across all industries and organizations of all sizes.
Attackers aren’t just after the obvious data
Seemingly innocuous records can be a goldmine for social engineers.
• User training is key
Avoiding breaches can often be as simple as teaching users about security risks.

Breaches are out there, but that doesn’t mean you have to be a target. Discover more ways to stay safe in the full report.