 {"id":27069,"date":"2021-01-25T10:08:04","date_gmt":"2021-01-25T17:08:04","guid":{"rendered":"https:\/\/moderneuc.com\/?p=27069"},"modified":"2026-02-18T13:02:21","modified_gmt":"2026-02-18T20:02:21","slug":"cloud-data-security-report","status":"publish","type":"post","link":"https:\/\/jorgep.com\/blog\/cloud-data-security-report\/","title":{"rendered":"Cloud Data Security Report"},"content":{"rendered":"\n<p>Security threads are real and constant to every organization no matter how small or big they are.&nbsp;&nbsp;This weekend I just came across one of the best \u201ceasy-to-read\u201d research survey I have seen regarding current state of  securing data on the the cloud.<\/p>\n\n\n\n<p>According to a report, available for free, &nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.netwrix.com\/2021_cloud_data_security_report.html\" target=\"_blank\">Netwrix\u2019s 2021 Cloud Data Security Report<\/a>, organizations experienced an average of 2.8 cloud security incidents in the past 12 months.&nbsp; According to the report: the most common cloud security incidents by organization size follow: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/jorgep.com\/blog\/wp-content\/uploads\/image-24.png\" alt=\"\" class=\"wp-image-27071\"\/><\/figure>\n\n\n\n<p>A couple of highlights, <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>48% of CISOs say that business pressure for rapid digitalization, transformation and growth distracts them from data security<\/li><li>The top 3 incident types were phishing (40%), ransomware (24%) and accidental data leakage (17%).<\/li><li>More than a third (35%) of organizations that suffered data theft by hackers said the incident caused them to lose their competitive edge and\/or experience increased customer churn.<\/li><li>62% of organizations are going to remove sensitive data from the cloud or have already done so, in order to improve data security. This is up from 48% in 2019.<\/li><li>On average, organizations allocate 27% of their cybersecurity budget to cloud security.<\/li><\/ul>\n\n\n\n<p>As far as the question are the top pains for CISO and CIO:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/jorgep.com\/blog\/wp-content\/uploads\/image-25.png\" alt=\"\" class=\"wp-image-27072\"\/><\/figure>\n\n\n\n<p>The report goes on to analyze and explain the breach consequences, average detection time, as well as some other excellent data points, compares to the results of a similar survey done in 2019, and provides pointed &nbsp;bottom-line recommendations to follow.<\/p>\n\n\n\n<p>Overall excellent \/ easy-to-understand report which makes you think a lot about how you are to protect your non-sensitive and sensitive data on the cloud.  <\/p>\n\n\n\n<p>Full report at: <a rel=\"noreferrer noopener\" href=\"https:\/\/www.netwrix.com\/2021_cloud_data_security_report.html\" target=\"_blank\">Netwrix\u2019s website:   2021 Cloud Data Security Report<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security threads are real and constant to every organization no matter how small or big they are.  This weekend I just came across on of the best \u201ceasy-to-read\u201d reports I have seen regarding securing data on the the cloud.<\/p>\n","protected":false},"author":2,"featured_media":368570,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[681,441],"tags":[700,702,742],"class_list":["post-27069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-moderneuc2","category-tech-talk","tag-cybersecurity","tag-data-security","tag-moderneuc1"],"taxonomy_info":{"category":[{"value":681,"label":"ModernEUC"},{"value":441,"label":"Tech Talk"}],"post_tag":[{"value":700,"label":"Cybersecurity"},{"value":702,"label":"Data Security"},{"value":742,"label":"ModernEUC"}]},"featured_image_src_large":["https:\/\/jorgep.com\/blog\/wp-content\/uploads\/CloudDataSecurity-Featured.png",730,430,false],"author_info":{"display_name":"Jorge Pereira","author_link":"https:\/\/jorgep.com\/blog\/author\/jorge\/"},"comment_info":0,"category_info":[{"term_id":681,"name":"ModernEUC","slug":"moderneuc2","term_group":0,"term_taxonomy_id":691,"taxonomy":"category","description":"","parent":0,"count":261,"filter":"raw","cat_ID":681,"category_count":261,"category_description":"","cat_name":"ModernEUC","category_nicename":"moderneuc2","category_parent":0},{"term_id":441,"name":"Tech Talk","slug":"tech-talk","term_group":0,"term_taxonomy_id":451,"taxonomy":"category","description":"","parent":0,"count":670,"filter":"raw","cat_ID":441,"category_count":670,"category_description":"","cat_name":"Tech Talk","category_nicename":"tech-talk","category_parent":0}],"tag_info":[{"term_id":700,"name":"Cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":710,"taxonomy":"post_tag","description":"","parent":0,"count":29,"filter":"raw"},{"term_id":702,"name":"Data Security","slug":"data-security","term_group":0,"term_taxonomy_id":712,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":742,"name":"ModernEUC","slug":"moderneuc1","term_group":0,"term_taxonomy_id":752,"taxonomy":"post_tag","description":"","parent":0,"count":284,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/27069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/comments?post=27069"}],"version-history":[{"count":1,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/27069\/revisions"}],"predecessor-version":[{"id":518829,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/27069\/revisions\/518829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media\/368570"}],"wp:attachment":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media?parent=27069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/categories?post=27069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/tags?post=27069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}