{"id":4403,"date":"2025-02-14T20:49:00","date_gmt":"2025-02-14T20:49:00","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=4403"},"modified":"2025-02-14T20:49:00","modified_gmt":"2025-02-14T20:49:00","slug":"watch-out-cybercriminals-breaching-cloud-systems","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/watch-out-cybercriminals-breaching-cloud-systems\/","title":{"rendered":"Watch Out! Cyber Criminals Breaching Cloud Systems"},"content":{"rendered":"\n<p>In 2025 as more business adopt\u00a0cloud technology, cyber criminals are learning new ways to\u00a0breach cloud systems\u00a0and steal sensitive data. With statistics reporting that <a href=\"https:\/\/expertinsights.com\/insights\/50-cloud-security-stats-you-should-know\/?utm_source=chatgpt.com\">45%<\/a> of data breaches are cloud-based, indicating a substantial focus of cybercriminals on cloud infrastructures.<\/p>\n\n\n\n<p>One of the most common ways that hackers breach cloud systems is through misconfigured security settings by an organisation. For example, a storage account\/storage bucket&nbsp;may be&nbsp;unintentionally&nbsp;left open to the public, allowing anyone to access its contents.&nbsp;<\/p>\n\n\n\n<p>Another common attack method is&nbsp;<strong>phishing<\/strong>. Hackers may send fraudulent emails that appear to be from legitimate cloud providers, requesting users to login to their accounts. When the attacker gains access to the account, they can steal sensitive data and wreak havoc upon cloud systems.&nbsp;<\/p>\n\n\n\n<p>To prevent successful cloud breaches, organisations must take a proactive approach to cyber security, by implementing strong access controls,&nbsp;two factor or multi factor authentication,&nbsp;regular software monitoring and updates, and educate&nbsp;employees on how to identify&nbsp;potential&nbsp;phishing attacks.&nbsp;<\/p>\n\n\n\n<p><strong>For further guidance on&nbsp;<\/strong><strong>how to protect your cloud systems, please contact&nbsp;<\/strong><a href=\"mailto:enquiries@nebrcentre.co.uk\"><strong>enquiries@nebrcentre.co.uk<\/strong><\/a><strong>.&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Sign up for our&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\"><strong>free core membership<\/strong><\/a><strong>&nbsp;to&nbsp;<\/strong><strong>stay up to date on the latest cyber security news and to gain access to a wealth of handy online&nbsp;<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/resources\/\"><strong>resources<\/strong><\/a><strong>.&nbsp;<\/strong><\/p>\n\n\n\n<p>The NEBRC is a non-profit organisation that seeks to&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/services\/\">educate<\/a>,&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/news\/\">inform<\/a>, and&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/support\/\">support<\/a>&nbsp;businesses across the UK on how to stay safe online through robust cyber security practices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2025 as more business adopt\u00a0cloud technology, cyber criminals are learning new ways to\u00a0breach cloud systems\u00a0and steal sensitive data. With statistics reporting that 45% of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9034,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-4403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/4403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=4403"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/4403\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=4403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=4403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=4403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}