You may be interested in:

מודעות עובדים – קו ההגנה הראשון לפני כל מערכת אבטחת מידע

Employee awareness – the first line of defense before any information security system

הגנת הפרטיות

Have you mapped gaps against the privacy protection regulations or GDPR? Excellent. Now let's talk about the day after

ספק IT רגיל מול יועץ אסטרטגי (1)

Regular IT provider vs. strategic consultant: What's right for your business?

Zero Trust

Zero Trust is not a buzzword – it’s what prevented a ransomware attack at my client

תיקון 13

Amendment 13 to the Privacy Protection Law – What Every Business in Israel Must Know?

מומחה אבטחת מידע

The Critical Need for Board-Level Cybersecurity Expertise – A Strategic Imperative, Not a Luxury

דוח סייבר

How should a board of directors prepare for a cyber report and monitor the security situation?

יועץ אבטחת מידע ויועץ IT

The difference between an information security consultant and an IT consultant – and why your business needs both in one person

איך האקר רואה את הארגון שלך

How a hacker sees your organization – and the mistakes you're making without knowing it

תקנות הגנת הפרטיות

Information Privacy and Compliance with the Privacy Protection Regulations (2017) and Amendment 13

Categories

טעויות אבטחה נפוצות בענן

7 Common Cloud Security Mistakes Organizations Make – and How to Avoid Them

Introduction: Common Cloud Security Mistakes

The move to the cloud has changed the way we manage information systems – convenience, flexibility, accessibility from anywhere. However, many organizations mistakenly think that the vendor is “responsible for security,” and ignore their share of responsibility. In reality, most cloud leaks stem from misconfigurations – not system breaches.
In this article, we will review the seven most common mistakes – and present the simple way to fix them.

Mistake 1: Accounts with unnecessary administrator privileges

Too many accounts with full access leave the door open for an attacker. Even if the intention is good – “for convenience” – it is a significant breach.
What to do? Apply the principle of Least Privilege – only what is necessary, only when necessary. Conduct periodic audits of permissions.

Mistake 2: MFA is partially or not enabled at all

Without two-step verification (Multi-Factor Authentication), any simple password theft can turn into a full-blown breach.
What to do? Apply MFA to every user, including administrators, services, and third-party apps.

Mistake 3: Cloud backup without encryption or separation

Many backups are stored in the same account and in the same work environment – so a hacker who breaks into the account also accesses the backups.
What to do? Keep an encrypted, separate backup, preferably in another location (off-cloud or off-region).

Mistake 4: Files are open to anyone

Shared drives (SharePoint, Google Drive, AWS S3) are sometimes set to “public” access by mistake. This means that anyone can view, download, or modify files.
What to do? Perform an automatic scan of sharing permissions and disable unauthenticated access.

Mistake 5: Unencrypted recording of passwords and API keys

Files containing passwords, API keys, or access details – stored in clear text within code, documents, or emails.
What to do? Use a secure vault, encrypt sensitive information, and avoid transferring access through insecure means.

Mistake 6: Lack of cloud event monitoring and management

Without a system that monitors suspicious logins, changes in permissions, or network traffic, the organization will not detect an attack in real time.
What to do? Integrate SIEM or MDR services, or at the very least – activate the cloud provider's built-in alerts.

Mistake 7: Lack of a cloud data security policy

Without clear procedures – each team works differently, each department acts according to its own understanding, and lack of uniformity leads to loopholes.
What to do? Draft a clear policy for cloud security – including usage, permissions, backups, encryption, and user management.

Summary: Common Cloud Security Mistakes

The cloud is just as secure as a local server – but only if used correctly. One misconfiguration can expose all of your corporate information. The power is in your hands: Choose a secure provider, set internal policies, and use the monitoring and security tools that the cloud offers. 

Cybersecurity and IT – two worlds, one solution.
Picture1
Author

Idan Zabari

IDAN ZABARI is a leading strategic IT and cyber consultant. He helps businesses and organizations secure their data, promote technological innovation, and meet regulatory requirements. He believes in a practical and realistic approach tailored to the needs of small and medium-sized businesses.
Facebook
Twitter
LinkedIn
Scroll to Top