There are many reasons why our devices can be vulnerable. There are many threats that in one way or another could affect our privacy. However, there is something that has grown a lot in recent times: the use of the cloud . It is something that happens both at the level of home users as well as in companies and organizations. Now, according to a report that we echo, it is also one of the reasons that there are vulnerabilities that can be exploited.
Misuse of the cloud allows attackers to enter
There are many services that we can use to host content, to work remotely and to be able to communicate with other users. The cloud allows you to have everything available anywhere and at any time. But you have to have it well configured. A report from Aqua Security reveals that misconfiguration of the cloud makes 90% of organizations vulnerable. It is something that we can also apply at the level of private users, since it is used more and more.

This study has been conducted in the last 12 months. It may precisely be the period in which this type of service has grown the most. One of the main problems is having the ports open to anyone. In this sense, only 68% of those who receive an alert of a bad configuration, solve it.
This logically represents a very important problem, since these computers can be exposed so that hypothetical attackers launch their attacks and thus compromise privacy . Large companies, according to the report, take 88 days on average to fix these bugs. It is undoubtedly more than enough time for some type of attack to occur.
They also indicate that more than 40% of users had at least one misconfigured API and that it took an average of 60 days to fix that bug.

Data theft and DDoS attacks
A single misconfiguration in the cloud could lead to data theft , resource hijacking, and even denial of service or DDoS attacks. The latter could mainly affect organizations, since they would stop providing service to users and that could translate into economic loss. We already saw some tips for sharing files in the cloud safely.
Among the main errors when configuring a cloud we can mention an incorrect storage configuration, incorrect identity management configuration, data encryption problems or exploitable services through open ports. Encrypting your backups in the cloud is very important.
Therefore, a bad cloud configuration can attract hackers and cause a lot of problems. This is something that can affect both private users and especially companies and organizations that base their day-to-day life on this type of service that they are using.
Our advice is to properly protect services hosted in the cloud. We must always keep them updated, well configured, encrypt the files and not make mistakes that could be the gateway to hackers. The fact that something is so widely used, that it has grown so much in recent years, also makes it a target for hackers.