Remote work brings security problems
A group of security researchers has discovered hundreds of thousands of servers, ports and cloud services that are insecure. They can especially put children at risk remote workers, which have increased considerably in recent months. They are widely used services that are part of the day-to-day life of many companies and organizations.
It is especially necessary to highlight the danger of cloud services. We live in an age where it has become very popular. We have a wide range of possibilities and we are increasingly using this type of tool more and more. However, everything related to the pandemic has exposed many companies when using cloud services.
In many cases remote work was introduced without much margin. This meant that there was no adequate preparation, that the systems were not properly updated or protected. Many services had vulnerabilities And the fact that more users are using them has opened a significant opportunity for hackers.
We speak for example of remote desktop, the use of VPN or applications to work from home in a group with other users. All this has gained a very important weight in the last year. This allowed workers to perform their duties away from the corporate network. But of course, this has also brought certain complications in the form of vulnerabilities and bugs.
The cybercriminals they can exploit these exposed cloud services and servers to steal information, passwords, or sneak malware. They are based on existing vulnerabilities that are not fixed. They could, for example, log in remotely as if they were actually the victim and gain access to inside information of an organization.
Servers and cloud services, the most affected
These security researchers of which we echo have discovered a total of 392,298 servers that are exposed, 214,230 ports and 60,572 services in the cloud. All this after analyzing hundreds of companies.
In most cases, organizations are unaware that they really have servers, ports or services exposed on the network. They do not update the equipment and do not correct any bugs that may be present. Even in many cases they do not use correct encryption for the networks.
They have detected many vulnerabilities rated as high or critical severity Uncorrected. Should an attacker discover these flaws, they could carry out cyber attacks such as stealing information, passwords, or even carrying out ransomware strategies.
We must be aware that today a large amount of sensitive data is shared over the Internet. This means that in case of suffering any vulnerability that affects cloud services, it can seriously compromise all this information that we send and receive.