Survey: 46% of organisations fail to change security strategy after a cyber attack

(Source: ITWeb) If compromised, these can give attackers a crucial jumping-off point to achieve lateral access to sensitive data across networks, data and applications or to use cloud infrastructure for illicit crypto mining activities. Organisations increasingly recognize this security risk, but still have a relaxed approach toward cloud security.