The move to Working From Home has increased the reliance on cloud monitoring tools but that is not enough. The hackers are using the same tools to find weaknesses and exploit gaps. Reliance on cloud services to manage tour config is not enough. The simple solution is to have regular third party risk assessments, rolling config changes and real-time monitoring.
Great article – Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor — https://thehackernews.com/2020/09/cloud-monitoring.html
#cybersecurity #hacker #data #privacy