{"id":4741,"date":"2018-12-31T20:37:30","date_gmt":"2018-12-31T20:37:30","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=4741"},"modified":"2019-01-04T16:29:11","modified_gmt":"2019-01-04T16:29:11","slug":"cloud-threat-trends","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/","title":{"rendered":"Cloud Threats: What cyber security trends can teach us and how we can prepare for the next wave of attacks."},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img fetchpriority=\"high\" decoding=\"async\" width=\"480\" height=\"320\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg\" alt=\"\" class=\"wp-image-4758\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg 480w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474-300x200.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474-272x182.jpg 272w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<p>The word reflection often defines this time of year. We reflect on our wins and celebrate the progress that they signify. We reflect on our loses and identify the areas of our lives that need improvement or extra attention. However, we need to also reflect on the cloud threats that defined 2018 and armor up for next year\u2019s attacks. To prepare for the next wave of threats, you must keep abreast of the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/2018-it-security\/\" target=\"_blank\">vulnerable areas<\/a> that exist within the cyber landscape. One such area is the Cloud.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">The Benefits of the Cloud<\/h4>\n\n\n\n<p>The Cloud and its many improvements, continues to take the IT world by storm (pun intended). Gone are the days of physical data centers as more and more companies and organizations transition to cloud based storage. Moreover, the cloud is cost effective, has unparalleled storage capabilities and requires less manpower than that of data centers.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"> <br>Crypominers taking the Cloud Environment by Storm <\/h4>\n\n\n\n<p>Despite the benefits, the cloud environment has a target on its back. More and more attackers salivate at the thought of gaining access to the vast amount of data and sensitive information it holds. 2018 has been a testament to this. <a href=\"https:\/\/pages.checkpoint.com\/rs\/750-DQH-528\/images\/cyber-attach-trends-mid-year-report-2018.pdf?mkt_tok=eyJpIjoiWVRoak1UZzFOakUzWVdZNCIsInQiOiJROFwvSXZJTkdpSFlqd2htZ2MrT3lWZWdJVEZrK1wvRFNcL3NLY2dHbmkzRnczckQzWW1GN2ZkdFRnMUtxWkdYNDFCcTRvZzZBZ0JmXC83aUk5bUM0K1wvWTFYcmVDUzZLd1NcLzVTWlRzTlJNbXcwWmtEYjZ3U3RTcU1sREZoZVpNU25lbiJ9\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"According to Checkpoint\u2019s 2018 Mid-Year Cyber Attack Trend Report (opens in a new tab)\">According to Checkpoint\u2019s 2018 Mid-Year Cyber Attack Trend Report<\/a>, 51% or organizations experienced some degree of cloud-based attacks, including large companies like FedEx, Intel and Honda. Companies, who many of us presume have the best-in-class cloud protection. <\/p>\n\n\n\n<p>However, it appears that this year, the attackers have been two steps ahead of everyone else, resulting in their success. Successful cloud threats primarily stem from poor or ineffective security procedures and practices. However, according to the report, Cryptominers are now turning the cloud environment upside down. More and more cyber criminal are using cryptomining malware for unauthorized activities. They see the cloud infrastructure as a money making machine able to generate huge profits in the form of cryptocurrency. The sad truth is, these threat actors are not wrong because crypotominers can make them a whopping <a rel=\"noreferrer noopener\" aria-label=\"30,000  per month (opens in a new tab)\" href=\"https:\/\/www.webopedia.com\/TERM\/C\/cryptomining-malware.html\" target=\"_blank\">30,000  per month<\/a>. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Don&#8217;t let your Company be the next Victim<\/h4>\n\n\n\n<p>Although cryptominers are a great concern, understand that they are not the only major threat looming. Attackers are constantly creating and\/or finding new ways to infiltrate the cloud and compromise its data.<\/p>\n\n\n\n<p>Regardless of the avenue of attack, or the reason behind the attack, cloud threats are on the rise. It is up to you to <a rel=\"noreferrer noopener\" aria-label=\"remain informed (opens in a new tab)\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-awareness-training-outcomes-needed\/\" target=\"_blank\">remain informed<\/a> and take the necessary precautions to ensure that you and your organization do not become susceptible to the attacks that are on the horizon.<\/p>\n\n\n\n<p><em>Sources: Checkpoint<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The word reflection often defines this time of year. We reflect on our wins and celebrate the progress that they signify. We reflect on our loses and identify the areas of our lives that need improvement or extra attention. However, we need to also reflect on the cloud threats that defined 2018 and armor up [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4758,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,539,3],"tags":[28,771],"class_list":["post-4741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-cybersecurity-risk","category-data-security","tag-cloud-2","tag-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Threats: What 2018 cyber security trends can teach us<\/title>\n<meta name=\"description\" content=\"Understanding the cloud threats that defined 2018, is the first step to protecting you and your business from the threats that are on the horizon.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Threats: What 2018 cyber security trends can teach us\" \/>\n<meta property=\"og:description\" content=\"Understanding the cloud threats that defined 2018, is the first step to protecting you and your business from the threats that are on the horizon.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-31T20:37:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-04T16:29:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zaudita Fender\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zaudita Fender\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\"},\"author\":{\"name\":\"Zaudita Fender\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/30220b7a34ba2cc2afa87ae22ac67b15\"},\"headline\":\"Cloud Threats: What cyber security trends can teach us and how we can prepare for the next wave of attacks.\",\"datePublished\":\"2018-12-31T20:37:30+00:00\",\"dateModified\":\"2019-01-04T16:29:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\"},\"wordCount\":442,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg\",\"keywords\":[\"cloud\",\"threats\"],\"articleSection\":[\"Cloud\",\"cybersecurity risk\",\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\",\"name\":\"Cloud Threats: What 2018 cyber security trends can teach us\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg\",\"datePublished\":\"2018-12-31T20:37:30+00:00\",\"dateModified\":\"2019-01-04T16:29:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/30220b7a34ba2cc2afa87ae22ac67b15\"},\"description\":\"Understanding the cloud threats that defined 2018, is the first step to protecting you and your business from the threats that are on the horizon.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg\",\"width\":480,\"height\":320,\"caption\":\"cloud threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Threats: What cyber security trends can teach us and how we can prepare for the next wave of attacks.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/30220b7a34ba2cc2afa87ae22ac67b15\",\"name\":\"Zaudita Fender\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/26058d8e5420f97fe06cc37206c91f92bc862bd778f4367d370d11c7a5dd2552?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/26058d8e5420f97fe06cc37206c91f92bc862bd778f4367d370d11c7a5dd2552?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/26058d8e5420f97fe06cc37206c91f92bc862bd778f4367d370d11c7a5dd2552?s=96&d=mm&r=g\",\"caption\":\"Zaudita Fender\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/adminsupport\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Threats: What 2018 cyber security trends can teach us","description":"Understanding the cloud threats that defined 2018, is the first step to protecting you and your business from the threats that are on the horizon.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Threats: What 2018 cyber security trends can teach us","og_description":"Understanding the cloud threats that defined 2018, is the first step to protecting you and your business from the threats that are on the horizon.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/","og_site_name":"TechTonic Times","article_published_time":"2018-12-31T20:37:30+00:00","article_modified_time":"2019-01-04T16:29:11+00:00","og_image":[{"width":480,"height":320,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg","type":"image\/jpeg"}],"author":"Zaudita Fender","twitter_misc":{"Written by":"Zaudita Fender","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/"},"author":{"name":"Zaudita Fender","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/30220b7a34ba2cc2afa87ae22ac67b15"},"headline":"Cloud Threats: What cyber security trends can teach us and how we can prepare for the next wave of attacks.","datePublished":"2018-12-31T20:37:30+00:00","dateModified":"2019-01-04T16:29:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/"},"wordCount":442,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg","keywords":["cloud","threats"],"articleSection":["Cloud","cybersecurity risk","Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/","name":"Cloud Threats: What 2018 cyber security trends can teach us","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg","datePublished":"2018-12-31T20:37:30+00:00","dateModified":"2019-01-04T16:29:11+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/30220b7a34ba2cc2afa87ae22ac67b15"},"description":"Understanding the cloud threats that defined 2018, is the first step to protecting you and your business from the threats that are on the horizon.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/12\/dreamstime_xs_49089474.jpg","width":480,"height":320,"caption":"cloud threats"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/cloud-threat-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Threats: What cyber security trends can teach us and how we can prepare for the next wave of attacks."}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/30220b7a34ba2cc2afa87ae22ac67b15","name":"Zaudita Fender","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/26058d8e5420f97fe06cc37206c91f92bc862bd778f4367d370d11c7a5dd2552?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/26058d8e5420f97fe06cc37206c91f92bc862bd778f4367d370d11c7a5dd2552?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26058d8e5420f97fe06cc37206c91f92bc862bd778f4367d370d11c7a5dd2552?s=96&d=mm&r=g","caption":"Zaudita Fender"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/adminsupport\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=4741"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/4758"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=4741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=4741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=4741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}