According to the recent report, Microsoft 365 became a weak spot exploited by violators in 85% of companies within one year.
More than 1/3 of respondents claimed that remote work affected the safety of organisations using Microsoft 365 and made it harder to prevent emails from leakage.
15% of firms using Microsoft 365 faced consequences of beyond 500 data breaches, whereas only 4% who didn’t use it dealt with the same number.
The problems which ensue from the breaches appeared to be heavier on Microsoft 365 users – 93% vs. 84% of those who didn’t use it.
CyberNews has recently counted the quantity of unprotected databases, and it’s clear that no matter what we read in news today more leaks are yet to come – 19 petabytes of data is exposed to malicious actors and threatening activities right now in accordance with the CyberNews research.
The protection of about 29,000 databases is totally neglected – passwords, document scans, health records, credit card details are subject to becoming a tool for attackers’ intentions, such as phishing, social engineering attempts and identity theft.
Most of them allow the quickest access without using a password and a username. The biggest number of publicly accessible information is stored on Hadoop – more than 18,000 terabytes, 459 databases, then goes Elasticsearch with only 143 terabytes of information, though stored within 19,814 databases, and then there is MongoDB with 6,5 terabytes of data in 8,946 databases.
China leads the list of countries which have their information leaked from these storages. US are placed second and followed by Germany and India. China’s weakest spot appeared to be Elasticsearch as well as for the US and Germany, whereas India suffered from MongoDB the most.
Although the heaviest database belongs to China (US placed second again) and is stored in Hadoop.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!