The 9 Most Dangerous Cloud Security Threats

3. Account Or Service Hijacking

In a cloud environment, an attacker can use stolen credentials to eavesdrop, manipulate data, return fake data, and redirect customers to illegitimate sites, according to the CSA report. Companies should ban the sharing of account credentials between users and services and use strong, two-factor authentication to mitigate the risk, the group advised.


Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.