Skip to content

Essential software development security best practices to reduce risks

 

Summary: Focus on security from the start with MFA, safe defaults, and input validation. Prevent SQL injection, XSS, and memory exploits.

Cyber-attacks are growing more frequent and damaging. Critical sectors like healthcare and education are common targets. Threat actors are quick to exploit weak software. This leaves companies and users struggling to keep up. But there’s a better approach: build security into software from the start.

In 2023, CISA launched its Secure by Design campaign. It highlights the need for secure software development and corporate accountability. High-profile breaches like SolarWinds and Kaseya show the risks of weak defenses. They also show why software makers must take the lead on security. 

This article will explore software development security best practices. It’s based on CISA’s guidelines and Secure Software Development Lifecycle ideas. Following these practices reduces risks and builds stronger, safer systems.

Why secure software development matters

Everyone agrees security is critical in software development, yet it’s often unclear how to achieve it. Without secure processes, businesses risk deploying vulnerable applications that bad actors can exploit.

Vulnerabilities by design

Technology powers every aspect of modern life. Internet-facing systems connect critical functions like healthcare and identity management. These innovations improve convenience but also create significant risks. Cyber-attacks have disrupted hospitals, leading to canceled surgeries and delayed care. A single flaw can let attackers exploit systems, threatening lives and data.

Secure software development tackles these risks by focusing on security from the start. Manufacturers who adopt secure design principles take responsibility for reducing risks. Features like default encryption and user authentication ensure fewer vulnerabilities for users.

Historical challenges with patching

Relying on patches after deployment creates extra work for users. For example, if a security flaw is discovered, customers must apply the fix themselves. This process can take time, leaving systems exposed to cyber-attacks. A real-world example is the WannaCry attack, which exploited unpatched systems worldwide.

Secure by Design addresses these challenges by fixing vulnerabilities before product launch. For instance, testing software for common weaknesses, like injection flaws, reduces the need for patches later. This approach aligns with secure software development lifecycle practices, saving time and boosting trust in the software.

Secure by design principles

Secure by Design means building security into every product from the beginning. A good example is adding multi-factor authentication (MFA) as a standard feature. It ensures users have a second layer of protection beyond passwords. Another example is setting safe defaults, like requiring strong passwords or enabling automatic updates.

Manufacturers should also follow software development security best practices, such as performing risk assessments during development. This step identifies potential threats and includes defenses against them. For instance, a defense-in-depth strategy can add multiple layers of protection, like firewalls, secure access controls, and network monitoring tools.

Reducing customer burden

Good software should make security easier for users. For instance, automated updates prevent users from forgetting critical patches. Another example is providing built-in network monitoring tools that alert about potential issues without manual setup. These features contribute to cloud security and cybersecurity resilience.

Manufacturers can also provide clear instructions to users. For example, warning users when they change secure default settings helps maintain safety. By easing the burden on customers, manufacturers ensure better protection and fewer missteps. Conducting security awareness training for users can further enhance security.

Leading by example in secure software

Some companies set the standard for secure development by making it a priority. For example, they use features like Cloud Firewall to support network segmentation. This strengthens security in development environments by blocking unauthorized access. It helps protect users, safeguard intellectual property, and improve access controls.

A strong example is a company implementing Zero Trust Network Access (ZTNA) to limit system access. By requiring users to verify identity and devices, they reduce risks. Such practices, combined with secure coding practices, highlight the value of adopting a secure software development framework.

Common cyber-attacks for software development

 

1. SQL Injection

SQL injection (SQLi) is a dangerous cyber-attack targeting databases. It happens when bad actors add malicious code to input fields. This trick lets them bypass normal security checks and access data. For example, they can use a login form to steal sensitive information. SQL injection remains one of the most common web application vulnerabilities.

The impact of SQL injection is severe. It allows attackers to steal or delete sensitive data. In some cases, they can even take full control of the system. For example, an attacker might enter “OR 1 = 1” into a login field. This tricks the database into granting access without a password. According to reports, SQLi attacks accounted for 23% of major vulnerabilities in 2023.

Organizations handling sensitive data are prime targets. SQL injection attacks can expose personal records, financial data, and trade secrets. For instance, an attacker could use SQLi to steal customer payment information. In extreme cases, attackers have deleted entire databases. Such attacks often result in financial loss, lawsuits, and reputational damage.

SQL injection can also exploit error messages to learn about a system. Some attacks use “stacked queries” to execute multiple commands at once. For example, “DROP TABLE Users;” can delete critical data. In another example, attackers might extract usernames and passwords using the “UNION” SQL operator. This type of attack affects industries like retail, travel, and finance the most.

Preventing SQL injection requires strong secure coding practices. Developers should use prepared statements and validate all user input. Web application firewalls (WAFs) add an extra layer of defense. Regular security audits and vulnerability scans help catch issues early.

2. Command injection

Command injection is a critical software vulnerability. It lets attackers run harmful commands on systems. These commands can grant unauthorized access or full system control.

This issue arises when user input isn’t validated properly. Attackers craft input to manipulate how commands are executed. For example, CVE-2024-20399 involved crafted input to exploit Cisco NX-OS software. This allowed attackers to execute commands with root privileges.

The CVE-2024-20399 flaw affected many Cisco devices, including Nexus and MDS switches. A China-linked group called “Velvet Ant” used it in a cyber-espionage campaign. They targeted network devices to maintain long-term access to organizational systems.

Secure design practices, like input validation, can prevent these issues. Separating commands from input can reduce risks and stop attackers from exploiting systems.

3. Cross-site scripting (XSS)

Cross-site scripting (XSS) is a common vulnerability in web applications. It happens when an application does not validate or sanitize user inputs. This allows bad actors to inject malicious scripts into the application. These scripts can then run on the browser of another user.

Attackers use XSS to manipulate or steal user data. For example, they might inject code into a comment section on a website. When another user views the comment, the script could steal their session cookies. These cookies can give attackers access to the victim’s account. XSS can also redirect users to fake login pages or load harmful files.

XSS is a big problem because it is widespread and preventable. A report from the Open Web Application Security Project (OWASP) lists XSS as one of the most common web application security issues. Proper input validation and using secure coding practices can stop these attacks. Modern web frameworks also help by encoding data to prevent malicious code execution.

Businesses need to take XSS seriously because it can harm many users. One mistake in code can expose millions of people to risk. Regular code reviews, automated tools, and aggressive security testing can help eliminate this threat. Addressing XSS early in the secure software development process is essential to protect applications and their users.

4. Exploitation of known vulnerabilities

Bad actors often exploit known vulnerabilities in software, tracked by unique IDs called CVEs (Common Vulnerabilities and Exposures). These vulnerabilities are listed publicly to help organizations manage and fix security flaws. When actively exploited, attackers use them to spread malware, steal data, or lock systems with ransomware. For example, some types of malware, like worms, spread automatically without user interaction, underscoring the urgency of remediation.

The KEV catalog highlights vulnerabilities actively exploited in real-world attacks. Organizations should prioritize fixing these issues using automated tools to save time and reduce risks. Installing updates, removing outdated software, or applying temporary fixes are key steps to protect systems from exploitation.

5. Memory safety exploits

Memory safety exploits are a common and serious threat. These happen when software written in memory-unsafe languages, like C or C++, mishandles memory. Mistakes in managing memory can cause vulnerabilities like buffer overflows or use-after-free errors. These allow attackers to take control of software, systems, or data. For example, a buffer overflow can let attackers execute malicious code.

Most open-source software (OSS) projects rely on memory-unsafe languages. About 52% of critical OSS projects analyzed include memory-unsafe code. In total, 55% of the lines of code in these projects are written in unsafe languages. Even projects written in memory-safe languages often depend on unsafe components. This increases the risk of memory safety vulnerabilities spreading through dependencies.

The largest OSS projects are more likely to have unsafe code. Among the ten biggest projects analyzed, the median unsafe code usage is 62.5%. In four of these projects, over 94% of the code is unsafe.

These vulnerabilities are especially dangerous in performance-critical software, like operating systems or cryptography tools. Attackers target these systems to exploit weaknesses.

Using memory-safe programming languages, like Rust, can reduce these risks. These languages automatically handle memory management, which helps prevent errors. However, developers sometimes disable safety features to improve performance. This can create new vulnerabilities. Memory safety exploits remain a major challenge and require secure coding practices to minimize risks.

 

Software development security best practices

Implementing software development security best practices is vital for creating secure applications. These strategies help protect users from security risks while improving software reliability. When applied throughout the secure software development lifecycle, they address vulnerabilities and strengthen defenses. Below are key principles and approaches to ensure secure software and reduce evolving threats.

1. Secure by default practices

Ensuring software is secure “out of the box” minimizes user burden and proactively addresses security vulnerabilities. This approach forms a foundation for secure software development.

  • Eliminate default passwords. Replace default credentials with strong, unique passwords during setup. For example, enforce minimum password lengths and block known compromised passwords to protect secure access.
  • Conduct field tests. Evaluate software security features in real-world environments. Insights from red team exercises can identify gaps in firewall settings or weak points in VPN implementations.
  • Discourage unsafe legacy features. Phase out insecure protocols like outdated TLS versions. Use seamless upgrade paths and in-product alerts to encourage the adoption of safer options while maintaining compatibility with cloud security standards.

2. Secure product development practices

Embedding secure coding practices into every stage of the secure software development framework ensures long-term protection against threats and enables secure development.

  • Document secure SDLC framework conformance. Use frameworks like the NIST Secure Software Development Framework (SSDF) to guide development. Publish security requirements and justify alternative approaches for unique use cases in cloud computing environments.
  • Mature vulnerability management. Move beyond patching to address root causes of security vulnerabilities. For example, implement quality improvement strategies to prevent recurring issues in applications involving VPN or network monitoring tools.
  • Foster a workforce that understands security. Conduct security awareness training to educate developers on secure coding practices. Integrate security topics into hiring processes and collaborate with institutions to strengthen cybersecurity skills among future developers.

3. Application hardening techniques

Application hardening strengthens software against exploitation by reducing security risks and making it more resilient.

  • Validate user input. Prevent common attacks like SQL injection and cross-site scripting by sanitizing inputs. For example, in cloud computing environments, validate APIs to protect data integrity.
  • Adopt memory-safe programming. Use languages like Rust to eliminate memory-related security vulnerabilities. This is particularly critical in applications involving sensitive operations like network monitoring or firewall configurations.
  • Implement cryptographic safeguards. Secure sensitive data with encryption and hardware-backed key management. For instance, use hardware modules to store keys securely in VPN or cloud security systems.

4. Reducing attack surfaces

Minimizing unnecessary exposure is a critical component of software development security best practices. Reducing attack surfaces enhances secure software development.

  • Remove unused features. Disable or eliminate features no longer needed, such as legacy APIs. For example, retiring outdated services in cloud computing environments reduces security risks.
  • Create secure configuration templates. Provide templates tailored for low, medium, and high-risk environments. This simplifies secure development while ensuring adherence to security requirements.
  • Implement attention-grabbing alerts. Notify users of unsafe configurations like admin accounts without MFA. For instance, persistent alerts can improve software security by encouraging secure settings in applications.

5. Balancing security and usability

Effective security practices must balance protection with usability. A focus on user experience ensures that secure software development lifecycle measures are effectively implemented.

  • Reduce hardening guide complexity. Simplify guides for end users by automating security configurations. For instance, automated firewall rules and VPN policies can be used to streamline setup.
  • Provide clear nudges. Regular reminders encourage users to address potential security risks, such as enabling MFA or updating to more secure cloud security protocols.
  • Innovate thoughtfully. Design intuitive security features like Single Sign-On (SSO) to reduce friction for users. For example, SSO simplifies access without compromising secure access protocols.

These strategies ensure strong cybersecurity, effective protection in cloud computing, and robust safeguards through tools like VPN, firewall, and network monitoring.

Common mistakes to avoid

Building secure software requires careful planning and attention to detail. Common mistakes are grouped into product properties, security features, and organizational processes.

 

Product properties

Using memory-unsafe languages

Developing software in memory-unsafe languages like C or C++ without a roadmap to reduce vulnerabilities increases security risks. These languages can introduce critical flaws like buffer overflows, leaving systems exposed.

Software manufacturers should adopt a secure software development framework with a memory safety roadmap. Prioritize fixing vulnerabilities in sensitive areas, such as network-facing code and cryptographic functions. Following secure coding practices will significantly lower the likelihood of such security vulnerabilities.

Default passwords

Shipping products with default passwords is a dangerous practice. Default credentials are often easy to guess or publicly documented, making systems vulnerable to unauthorized access.

Always require users to set unique, strong passwords during installation.

Security features

Lack of multi-factor authentication (MFA)

Failing to include MFA in products that authenticate users significantly weakens security. Passwords alone are insufficient to protect against breaches.

Ensure MFA is supported in all products, especially for admin accounts. This practice is crucial for secure development and reducing security risks in critical systems. Aligning MFA with a secure software development lifecycle further strengthens defenses.

 

Inadequate logging for intrusions

Products without robust logging capabilities make it difficult for customers to detect and investigate intrusions. Logs should include critical data, such as configuration changes and user activities.

Software manufacturers should provide industry-standard logging features. For SaaS and cloud computing products, include at least six months of log retention. Enhanced network monitoring and cloud security tools help organizations meet key security requirements.

Organizational processes

Releasing software with known vulnerabilities

Releasing software that includes known exploitable vulnerabilities undermines security. Attackers often exploit these flaws before patches are issued.

Manufacturers must follow secure software development lifecycle practices, including scanning for vulnerabilities before release. Maintain a software bill of materials (SBOM) to track dependencies and ensure timely updates. Cloud security solutions and firewalls can further mitigate these risks.

Failing to disclose vulnerabilities

Not publishing CVEs (Common Vulnerabilities and Exposures) for critical flaws reduces transparency and puts users at risk. Customers depend on timely information to manage vulnerabilities.

Publish CVEs for all high-impact vulnerabilities promptly. Include details like CWE (Common Weakness Enumeration) codes to guide customers in understanding and mitigating risks. Conduct security awareness training for teams to improve processes and meet secure software development security requirements.

Case study: Successful software security with NordLayer

WeTransfer needed a reliable and flexible VPN to support global operations and meet ISO 27001 standards. Their outdated, on-site VPN couldn’t handle an office move or provide secure access for teams across 130+ regions. This created risks like phishing and ransomware.

NordLayer’s cloud-native solution offered a Dedicated server with Fixed IP for secure connectivity, Shared Gateway locations for secure internet access, and adaptive Okta integration to improve access control.

Switching to NordLayer improved operations. Developers can work faster with reduced network latency and secure access via NordLayer’s Business VPN. NordLayer also supported WeTransfer’s ISO 27001 compliance efforts. NordLayer’s platform helped WeTransfer secure its network and protect millions of users worldwide.

Explore our cybersecurity solutions for software development, or contact our sales team to learn how NordLayer can secure your operations.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The complete guide to boosting data security in cloud computing

Summary: Discover top strategies to secure your cloud data with NordLayer, from encryption to micro-segmentation. Keep your data safe in the cloud.

According to Gartner, over 80% of organizations will take a cloud-first approach in 2025. This prediction highlights how cloud computing has become the go-to for flexible, cost-effective operations. The benefits of on-premise to cloud migration are clear: scalability, efficiency, savings, and stronger data protection in a cloud environment.

However, as businesses rely more on the cloud to store, manage, and exchange data, they can also become a bigger target for cyber threats. That’s why data protection is more important than ever. In this article, we will share tips on how to boost your data security in cloud computing.

Basics of data security in cloud computing

Cloud data security includes tools and policies that protect data in the cloud from loss, leakage, or misuse. This helps prevent breaches, data theft, and unauthorized access.

A good cloud security strategy focuses on securing data across networks, applications, containers, and other cloud environments. It also controls who can access data and ensures complete visibility of data on the network. The strategy must protect data in three main ways:

  • Data in use: Secure data while it’s being used by apps or devices through authentication and access control.
  • Data in transit: Protect sensitive data as it moves across the network with encryption and other security methods.
  • Data at rest: Keep stored data safe with access restrictions and authentication.

Cloud environments can be public, private, or a mix of both. Regardless of the environment, the key to strong cloud data security is combining robust access controls, encryption, and continuous monitoring.

Cloud data security: Who is responsible for what?

Cloud security is a shared responsibility between the organization and its cloud service provider (CSP), with the exact breakdown depending on the cloud service. However, 73% of organizations don’t fully understand their role in cloud security responsibilities, which may lead to blind spots.

The cloud service provider (CSP) is responsible for securing the cloud infrastructure, which includes the physical hardware, network, and services like computing, storage, and databases. They also provide security tools to help customers configure their security settings.

The customer, on the other hand, is responsible for cloud data security. Always. Here is how it breaks down in more detail:

  • Private cloud: Since the cloud is hosted in its own data center, the organization handles all cloud security. This includes the physical network, infrastructure, hypervisor, virtual network, operating systems, firewalls, service configuration, identity and access management, and all aspects of data security.
  • Public cloud: In public clouds, like Google Cloud, Amazon Web Services, or Microsoft Azure, the CSP manages infrastructure and network security. The customer manages their apps, data, and access.
  • SaaS: The vendor secures the platform, including physical, infrastructure, and application security. The customer is responsible for their data and access security.

The bottom line is that organizations can’t depend on cloud vendors for data security. No matter the cloud model, they must continue to protect their data.

Why protecting data in the cloud is essential

With the increase of remote work, cloud services, and IoT devices, attack surfaces have grown, making sensitive data more vulnerable than ever. This growing trend makes data security a top concern for organizations.

The main reasons for protecting data security in the cloud are meeting compliance regulations, maintaining trust, and keeping sensitive information safe.

#1 Meet compliance standards

Organizations across industries must follow various data security regulations to safeguard sensitive information. Whether it’s protecting customer data, financial records, or healthcare information, compliance is non-negotiable. Breaking these rules can lead to fines, legal trouble, and costly disruptions.

But it’s not just about avoiding fines—customers and partners expect their data to be handled safely. Good security practices help meet those requirements and show others you can be trusted.

#2 Protect your brand reputation

A data breach can severely damage your company’s reputation. When customers lose trust, they might take their business elsewhere, and it’s tough to win them back.

The damage to a brand often costs more than fixing the breach itself. Years of hard work can be undone in days. By keeping data secure, you’re protecting your reputation and customer confidence in your brand.

#3 Keep your sensitive information safe

Organizations store vast amounts of valuable data, from trade secrets and intellectual property to customer information and operational systems. Cybercriminals know this and target that information to steal or disrupt operations.

Beyond stealing data, some attacks shut down systems or even critical infrastructure, causing major problems. Comprehensive security keeps your valuable data and systems safe so your business can run without interruptions.

Why storing data in the cloud is a smart choice

More and more organizations are adopting cloud computing because it helps digital transformation and offers practical benefits. By storing data in the cloud, businesses can gain advantages like lower costs, better resource use, easier access, and scalability.

Cloud computing simplifies teamwork from anywhere and gives access to tools and technologies without big upfront costs. Its flexibility and reliability make it a key part of modern business growth.

Let’s have a look at the benefits of storing data in the cloud.

Reduced costs

Cloud storage is often more affordable because the costs of servers and infrastructure are shared across many users. Instead of paying for expensive on-site systems, businesses can use cloud solutions to save money without sacrificing performance.

Better resource use

In a cloud model, the cloud service provider (CSP) handles all the maintenance—servers, hardware, databases, and other infrastructure. This means businesses no longer need to manage on-premises systems or dedicate time and money to keeping them up and running.

Easier access

Cloud-based databases can be accessed by authorized users from any device and location, as long as there’s an internet connection. This level of accessibility is essential for remote employees, where teams need to collaborate seamlessly, no matter where they are.

Scalability

Cloud resources are flexible. Businesses can quickly scale their databases up or down to handle changes in demand. Whether managing seasonal spikes, supporting a growing customer base, or dealing with unexpected surges, the cloud makes it easier and more cost-effective to adjust resources as needed.

Business risks to storing data in the cloud

While cloud storage has many benefits, it also comes with cloud security risks. Here are some challenges businesses may face if proper security measures aren’t in place.

Data breaches

Data breaches in the cloud happen differently from those in on-premises systems. Attackers often exploit misconfigurations, weak access controls, stolen credentials, and other security gaps instead of relying on malware.

Misconfigurations

Misconfigurations are the leading security risk in the cloud. They can result in overly broad account permissions, poor logging, and other gaps that make organizations vulnerable to data breaches, insider threats, and attacks by external adversaries.

Unsecured APIs

APIs connect services and transfer data, but they can create security risks. Changes in data policies or privilege levels can make it easier for unauthorized users to access more data than intended, especially if APIs are not properly secured.

Access control and unauthorized access

In multi-cloud or hybrid environments, organizations often rely on the default access controls provided by their cloud services. This can create issues, particularly when insider threats exploit their privileged access to cause damage or hide their actions.

Compliance and regulatory challenges

Data storage in the cloud must follow rules like GDPR, CCPA, and HIPAA. If your business doesn’t comply, it could face fines and damage its reputation. To stay compliant, businesses must ensure their cloud services meet these rules and handle data correctly.

Shared responsibility model

In the shared responsibility model, security is split between the cloud provider and the business. If businesses don’t fully understand what they’re responsible for, it can create security gaps. Misunderstanding this division can leave systems vulnerable.

6 best practices for securing data in the cloud

To keep data safe, organizations need a strong data security plan that specifically tackles cloud-related risks. As cloud environments introduce unique vulnerabilities, a comprehensive security strategy must address these challenges. Here are six best practices to follow:

Use advanced encryption

Encrypting data is a great way to protect it. This changes data into unreadable text before it enters the cloud. Encrypt both data in transit and at rest. Cloud providers offer built-in encryption, but you can also use your tools for more control.

Implement a data loss prevention (DLP) tool

DLP tools help prevent data loss, leaks, or misuse. They also detect unauthorized access or data breaches. Before you choose a DLP tool, make sure it is designed for a cloud environment.

Ensure visibility across your cloud environments

Get full visibility into your private, hybrid, and multi-cloud environments. This helps detect issues like misconfigurations, vulnerabilities, and security threats. Cloud security monitoring provides insights that guide actions to fix problems.

Make compliance your priority

Implementing the Zero Trust approach helps align your security policies with industry and government standards. Built on the principle of trust no one, verify everything, it ensures that only authorized users and compliant devices can access sensitive data.

Additionally, Device Posture Security lets you monitor devices connecting to your company network and block non-compliant ones based on predefined rules.

Strengthen identity and access management (IAM)

Identity and access management tools help manage who can access specific resources. They automate tasks like assigning access, updating privileges, and removing accounts. Follow the principle of least privilege—give users only the access they need for their roles.

Securing your data in the cloud with NordLayer

Protecting your data in the cloud is more than just encryption. It’s about implementing a robust, multi-layered security strategy that covers all aspects of cloud access and control.

Here’s how NordLayer can help you take your cloud security to the next level:

  1. Secure Remote Access: With NordLayer’s Site-to-Site VPN, you can create a safe, encrypted tunnel to access your cloud, protecting your data from cyber risks.
  2. Access control: NordLayer’s Cloud Firewall allows you to implement micro-segmentation strategies, distributing different network access rights for specific users or teams. It adds an extra layer of protection for your critical data, ensuring compliance with stringent data security regulations.
  3. Device security: NordLayer’s Device Posture Security ensures that only authorized and compliant devices can access your network. It monitors device compliance and blocks user access from non-compliant devices to safeguard your resources.
  4. Multi-layered authentication: Enhance security with Single Sign-On (SSO) and multi-factor authentication (MFA) to double-check identities seamlessly. 

Get in touch with our sales team today to see how NordLayer’s solutions can strengthen your cloud data security. Also, be sure to download our Data Security Guide for more in-depth tips and actionable strategies.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Private cloud vs. public cloud: pros, cons, and which is right for your business?

Summary: The article explains private, public, and hybrid cloud environments, their pros and cons, and how NordLayer secures these models for performance and protection.

Cloud computing is changing how businesses of all sizes manage IT resources, making it more scalable and flexible. However, as companies embrace the cloud, they face an important decision: which type of cloud is right for them?

Whether it’s a public cloud, a private cloud, or a hybrid cloud, each option has its benefits, challenges, and ideal use cases. Choosing the right cloud model isn’t just about cost—it’s about matching the cloud environment to your specific needs in terms of security, performance, and control.

This guide will help you understand the differences between different cloud models. We’ll also look at how cloud security tools like NordLayer can keep your environment safe, whether using a private cloud, public cloud, or a combination of both.

Overview of cloud computing

Cloud computing refers to delivering computing resources—such as storage, processing, and applications—over the internet. Organizations use cloud services instead of physical servers for flexibility, scalability, and cost savings.

Choosing the right cloud service provider and model is vital for businesses and private and public clouds. It impacts operational efficiency and security. To dive deeper into securing your cloud environment, explore this guide to cloud security.

What is a private cloud?

A private cloud is a computing environment dedicated only to a single organization. Managed either on-premises or by a third-party cloud service provider, private clouds are ideal for businesses that need high levels of security and control.

How a private cloud works

Private cloud environments use dedicated infrastructure, either hosted in an on-site data center or operated by a cloud provider. This setup ensures greater control over data and resources.

Benefits of private cloud

When it comes to security, compliance, and customization, private clouds provide businesses with a tailored solution designed to meet their specific needs:

  1. Enhanced security and compliance. Organizations have full control over their private cloud environment, making it easier to meet regulatory requirements.
  2. Customizable solutions. A private cloud can be tailored to meet specific business needs.
  3. Stable performance. Dedicated infrastructure ensures uninterrupted operations, free from resource-sharing issues common in public clouds.

Private clouds are an ideal choice for organizations with advanced security needs because they offer tailored solutions and complete control over data.

Private cloud disadvantages

Although a private cloud can be a secure and reliable solution, it does require a considerable investment in both infrastructure and ongoing management:

  • High costs: Building and maintaining a private cloud requires a significant investment and ongoing expenses
  • Complex management: Managing a private cloud infrastructure often demands advanced IT expertise
  • Scalability challenges: Scaling a private cloud typically involves buying additional hardware, which can slow things down

For companies that prioritize scalability and ease of use, the limitations of private clouds may outweigh their benefits, especially when compared to public cloud solutions.

 

Use cases

Private cloud environments are ideal for businesses that need strict security, regulatory compliance, and full control over their infrastructure. For example, healthcare organizations rely on private clouds to manage sensitive patient data while complying with regulations like HIPAA. These systems ensure that data is securely stored and accessible only to authorized personnel.

Similarly, financial institutions benefit from private clouds by securely handling sensitive customer information and large transactions, meeting compliance standards such as GDPR or PCI DSS. Enterprises requiring tailored workflows or proprietary applications also choose private clouds because they can be customized. Additionally, private clouds are great for high-performance computing (HPC) tasks, such as scientific simulations or complex analytics, offering consistent and reliable performance.

What is a public cloud?

A public cloud environment is a cloud service shared among multiple organizations. Providers like AWS, Microsoft Azure, and Google Cloud offer public cloud environments on a pay-as-you-go or subscription basis.

How a public cloud works

A public cloud is hosted on the cloud provider’s infrastructure, where businesses can access shared resources over the internet. This model allows companies to pay only for the resources they use, providing a flexible and cost-effective solution.

Benefits of public cloud

A public cloud offers several key advantages for businesses:

  1. Affordability. Public clouds have no upfront infrastructure costs, making them accessible for businesses of all sizes.
  2. Scalability. Resources can be scaled quickly to match changing business needs.
  3. Ease of use. Managed by the cloud provider, public clouds require minimal setup or maintenance.

 

Public cloud disadvantages

While a public cloud offers significant benefits, there are some challenges to consider:

  • Security concerns: Data in a shared environment is potentially vulnerable to breaches
  • Performance variability: Sharing resources can slow down performance during peak usage
  • Limited customization: Public clouds usually can’t adapt to fit specific business needs

 

Use cases

Public clouds are a great fit for businesses seeking cost-effective scalability and ease of use. Startups and small businesses frequently adopt public clouds because they eliminate the need for upfront infrastructure investment, allowing them to scale resources as they grow. E-commerce platforms benefit from public clouds during peak shopping seasons, as the resources can quickly adjust to higher traffic without disrupting operations.

Public clouds are also popular among developers and tech firms. They offer flexible environments for testing and deploying applications without the overhead of physical servers. Media companies and streaming services use public clouds to distribute content globally, benefiting from their availability and robust delivery networks. Lastly, public clouds are ideal for disaster recovery and backup solutions, providing businesses with an affordable, off-site option to secure their data.

Private cloud vs. public cloud

When choosing between private and public clouds, consider factors like cost, scalability, and security. Here’s a quick comparison:

Private cloud vs public cloud table

Virtual private cloud vs. private cloud: Key differences in short

There are many similar terms involved in cloud computing, and a Virtual Private Cloud (VPC) is one of them. A VPC is a secure, isolated section within a public cloud where businesses can run their workloads with additional layers of security offered by a cloud provider.

In contrast, a private cloud is a dedicated infrastructure just for one organization. This distinction influences how each is implemented and managed. To learn more about “What is VPC?” and VPC vs. VPN, explore VPC best practices to optimize its deployment for your organization’s needs.

Hybrid cloud: A middle ground?

A hybrid cloud service provider integrates private and public cloud environments, allowing businesses to use each model strategically.

Benefits of a hybrid cloud

A hybrid cloud seamlessly integrates private and public cloud environments, allowing businesses to use both models strategically.

  • Flexibility. Critical workloads can stay in the private cloud, while less sensitive tasks use public resources.
  • Cost efficiency. Hybrid clouds combine the cost savings of public clouds with the security of private ones.
  • Scalability. Businesses can easily scale their resources using public cloud services.

By adopting a hybrid cloud, businesses can balance performance, security, and cost-efficiency. It’s a way to adapt to evolving demands with greater agility.

Ideal scenarios

Hybrid clouds combine the strengths of public and private clouds, making them suitable for businesses with diverse operational needs. Organizations experiencing fluctuating workloads often benefit from hybrid clouds. They can use private resources for steady operations while accessing public resources to handle demand spikes.

Industries with strict compliance needs, such as healthcare and finance, often adopt hybrid models. In these models, sensitive data is secured in private clouds, while public clouds are used for broader applications like analytics. Companies transitioning to multi-cloud strategies use hybrid cloud setups as a stepping stone, enabling flexibility and resilience through redundancy.

Hybrid clouds also benefit global enterprises with distributed teams, as they provide low-latency access via local public cloud resources while safeguarding core operations in private infrastructure. Furthermore, businesses focused on innovation often develop in public clouds for cost efficiency and later deploy stable solutions in private clouds for reliability and security.

Which cloud model is right for your business?

Considerations based on business size

The size of your business plays a crucial role in determining the most suitable cloud model. Start-ups often benefit from public clouds due to their affordability and the ability to scale rapidly without significant upfront investments. Public clouds enable small businesses to launch and grow without the burden of managing physical infrastructure.

Medium-sized enterprises typically find hybrid clouds most suitable as they balance cost-effectiveness with enhanced security and performance. These organizations can use public cloud resources for routine workloads while securing sensitive data or strategic applications in private cloud environments.

For large corporations with complex operations, private clouds are often the ideal choice. These enterprises require high levels of security, control, and customization to meet their operational needs and regulatory requirements. A private cloud ensures a stable infrastructure for managing large volumes of data and proprietary applications.

Industry-specific needs

The choice of cloud model also depends on the industry and its specific requirements. For instance, industries like healthcare and finance must prioritize compliance with strict regulations such as HIPAA and PCI DSS. These industries typically rely on private or hybrid clouds to secure sensitive data and ensure compliance while benefiting from cloud computing’s scalability and flexibility.

Technology and media companies, on the other hand, often require a highly scalable and flexible environment to manage dynamic workloads and unpredictable traffic spikes. These businesses benefit from public clouds for their cost efficiency and rapid scalability or from hybrid clouds that combine the advantages of both models for enhanced reliability and customization.

Long-term goals

Businesses with long-term growth ambitions often lean towards hybrid or multi-cloud strategies to future-proof their operations. Hybrid clouds offer the flexibility to adjust resources as needed, allowing companies to adapt to market demands while maintaining cost efficiency. Multi-cloud strategies provide even greater flexibility by leveraging multiple cloud service providers. This approach helps businesses optimize performance, avoid vendor lock-in, and enhance system resilience.

By considering business size, industry-specific needs, and long-term goals, organizations can identify the cloud model that aligns with their operational priorities and growth path.

Similarities between private cloud and public cloud services

While private and public cloud services have distinct differences, they share several key principles that make them essential for modern cloud computing. These similarities highlight how both models address everyday business needs, offering flexibility, efficiency, and enhanced accessibility.

  • Virtualization: Both use virtualization to deliver cloud resources
  • Remote accessibility: Users can access resources from anywhere
  • Cost efficiency: Both models reduce costs compared to traditional IT
  • Data backup options: Enable reliable disaster recovery solutions
  • Cloud adoption trends: Both contribute to increased global cloud integration

Understanding these shared features shows why both types of clouds are widely adopted across industries. They support businesses in optimizing their IT strategies and advancing cloud migration efforts globally.

How NordLayer secures cloud environments

NordLayer offers comprehensive solutions for securing access to private, public, or hybrid cloud environments. NordLayer delivers tools to ensure safe access to VPCs, making public cloud adoption safer for businesses of all sizes.

Key NordLayer’s solutions

Whether you’re using a private or public cloud, safeguarding access to it is essential. Implement multilayered authentication methods to ensure that only authorized users and devices can access these environments.

Also, use Site-to-Site functionality to ensure employees access these environments only through Virtual Private Gateways, which ensure your remote connections are encrypted.

Enhance your security with robust ZTNA measures by setting access control rules with features like Cloud Firewall and Device Posture Security. Use multiple MFA options to double-check identities and enforce location-specific policies to strengthen overall protection.

Partner Program benefits

By joining NordLayer’s Partner Program, MSPs can offer these advanced solutions to their clients, enhancing their value proposition and increasing profitability.

Selecting the right cloud model can transform your operations. With added security provided by solutions like NordLayer, businesses can confidently embrace cloud services, ensuring performance and protection. Whether you opt for private clouds, public clouds, or a hybrid cloud, securing your cloud environment should always be a top priority.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

2024 at NordLayer, that’s a wrap

Summary: NordLayer had an exciting 2024. We turned five this year, launched new features, and won cybersecurity awards. Next stop: 2025.

The year is coming to a close, and the holidays are just around the corner. It’s a good time to look back on 2024. It’s been a busy year—full of challenges, exciting updates, and plenty to celebrate.

This year, NordLayer turned 5! We earned a few critical cybersecurity awards and were top-rated in our partner survey. Today, we have customers in 118 countries. That’s a great reminder of why we do what we do.

Along the way, we introduced features that make staying secure even easier. As always, we’ve worked hard to improve what we offer to our customers.

Thanks for being part of our journey. Here’s to wrapping up 2024 on a high note—and to an even brighter, safer 2025!

Donatas quote

A snapshot of NordLayer’s 2024

A quick look at 2024

NordLayer turns 5

NordLayer started in 2019 as a VPN tool to secure remote work. When COVID-19 hit, businesses faced new challenges. We had to onboard hundreds of employees quickly, ensuring secure connections and business continuity. It was a tough test, but we overcame it, protecting businesses around the world.

As remote and hybrid work took off, NordLayer became more than just a VPN. We grew fast. We added new security features and focused on the Zero Trust model, improving our customers’ security.

This year, as we celebrate our fifth birthday, we’ve become a comprehensive network security platform. In 2024, we launched several new features and improvements, with more to come.

Top rated by our partners

In 2024, we brought 450 new partners (1000+ in total) on board, expanding our network across 40 countries.

Partner survey results

Last year, MSPs and our partners faced challenges related to strict compliance regulations and rapid tech changes. We ran a survey to see how we’re helping, and our partners gave us a 9/10 rating.

Our partners appreciate how easily NordLayer fits into their workflow, fast and reliable support, and the chance to grow revenue—all while keeping their clients safe.

Donata quote

Our customer stories

NordLayer now has more than 9,000 customers in 118 countries. We’ve gathered feedback from many of them, and their stories show how our solutions help them stay secure and efficient.

Customer quotes

New features and improvements in 2024

Here’s an overview of the new features and product improvements we made in 2024. Each makes network management easier and more efficient while boosting security. We have also added new locations to the NordLayer VPN server network.

Product development timeline

At the beginning of 2024, we added Active Session Timeout, a new feature and made one improvement to the Zero Trust Network Access (ZTNA) segment. How does it benefit users?

Features 5

We’ve also introduced a few new features to enhance network security and performance.

Features 6

With five new dashboards in the Control Panel, IT admins can get more insights and make network management easier.

Dashboard

Brave browser users can enjoy smooth performance with full support for the NordLayer Browser Extension. We’ve also improved the Site-to-Site feature, giving IT admins better visibility into site-to-site tunnels and the ability to make real-time adjustments in the Control Panel.

The last feature released in 2024 is Download Protection. It scans newly downloaded files for malware and provides instant reports on any threats or user activity, ensuring real-time protection.

Awards and events

It was a big year for NordLayer. We won the UK Business Security Award for the Outstanding Cybersecurity Solution 2024 category, and Tekpon announced NordLayer as the Top Cloud Security Software Tool.

We also earned a Cybersecurity Excellence Award for Network Access Control. Competing with over 600 entries, this award highlights how NordLayer makes network security simple and reliable for businesses. And we’re not stopping there—we’ll keep pushing to make our solutions better.

Povilas quote

In 2024, the sales team stayed busy, attending 18 events across the USA and Europe. They connected with partners, showing them why NordLayer is a go-to name in security.

Photos from events

From work to play: how we build teams

Workation

At NordLayer, we know the best teams are built through shared experiences. With 1,300 people from 22 countries, our workstations mix work and fun. We work together, but we also relax and enjoy each other’s company.

These moments recharge our batteries for the upcoming challenges and help us build stronger connections. For us, it’s not just about working hard but also about having fun and growing together.

What’s next for 2025?

We’ll keep improving and expanding our network security SSE-based solutions. More features and product improvements are on the way. But what’s next for 2025? Stay tuned!

Andrius Buinovskis quote
 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Biggest data breaches of 2024

Summary: Data breaches in 2024 soared, with record-high costs and over 1 billion records exposed. Learn what caused it.

The modern economy runs on data. Businesses thrive based on how they collect, analyze, and use customer data. But none of that matters if you drop the ball on cybersecurity.

Data breaches are a hot topic with C-Suite leaders, IT journalists, and customers. That’s no surprise. 2023 was bad, but 2024 has been one of the worst years yet on the cybersecurity front.

An average data breach now costs $4.9 million. Ransomware costs an average of $5.2 million, and thieves have stolen over 1 billion records.

Even so, we’re not here to spread panic. As this list of 2024’s biggest data breaches shows, every breach has a cause and a solution. Good security practices will defeat most attackers, and it helps to learn where others have failed. But first, let’s talk about statistics.

Key facts about 2024’s data breaches

2024 has been another banner year for data breaches, with cybercriminals accelerating their efforts to steal and monetize confidential information. The stats below show that data theft is commonplace, and organizations face a challenging data security environment:

  • National Public Data (NPD) will probably be 2024’s biggest data breach. The mammoth breach potentially impacts 2.9 billion records, close to the most significant data leak ever.
  • Change Healthcare suffered the largest health-related data breach of the year, affecting over 100 million customer records. This could make it the largest healthcare breach in history.
  • The average cost of a data breach reached $4.88 million in 2024.
  • The cost of a data breach in cloud environments was even higher, averaging $5.17 million.
  • 40% of breaches involved data stored across multiple environments.
  • 68% of 2024 data breaches involved human errors, such as falling for phishing scams.
  • 14% of attacks involved security exploits, three times the 2023 total.
  • On average, organizations took 194 days to identify data breaches.
  • The average attack took 64 days to contain.
  • Meta (Ireland) was fined 91 million euros for exposing customer data, the largest GDPR penalty in 2024.
 

The biggest data breaches of 2024

A devastating data breach is a nightmare for customers and affected organizations. But breaches can have a positive side. Each incident is a learning opportunity. It’s easier to defend critical data when we understand the mistakes made by others and the tactics used by attackers.

With that in mind, let’s explore 2024’s biggest data breaches. New breaches hit the news weekly, but we will discuss these cases for years.

1. National Public Data (1.3 billion individuals)

This one could be 2024’s biggest data breach. Before this year, few people knew National Public Data, a subsidiary of Jerico Pictures, Inc., but the company is now notorious for data security failures.

In April, data broker USDoD listed a cache of NPD 2.9 billion records for sale on the Dark Web. According to Jerico, the exposed data is related to 1.3 billion individuals. With a sale value of $3.5 million, it’s easy to see why criminals targeted the data handling company.

Filings with the Maine Attorney General suggested a massive regulatory penalty was on the cards. To make matters worse, NPD users filed a civil action in August, alleging the breach was foreseeable and avoidable.

Before either case could proceed, Jerico Pictures filed for bankruptcy in October. The company lost customer trust and folded as a direct result of the NPD breach. While USDoD has been arrested, the data thieves remain at large.

What data types were involved? Almost everything. The 2.9 billion records included personally identifiable information (PII), historical addresses, social security numbers, and nicknames used by record holders.

How did it happen? The details are unclear. As far as we know, the data breach started in December 2023. A bad actor nicknamed SXUL targeted NPD servers using unknown techniques. The data started to circulate on dark web forums, ending up with USDoD in April.

 

2. AT&T (2 breaches, over 110 million individuals)

 

AT&T is so big that a data breach there affects almost everyone. Unfortunately, the telecommunications giant reported two significant data breaches in 2024.

The first was a historical hack dating back to 2022. During a six-month window, hackers extracted call and messaging data for 110 million customers. In this case, AT&T was partly at fault. The compromised data resided on servers maintained by hosting company Snowflake (itself listed later in a separate breach).

The other security incident emerged when 73 million customer records appeared on a data brokerage. Alongside identifiable information, the cache contained encrypted passwords to access AT&T accounts. Panicked by the disclosure, AT&T issued a rare force reset of over 7 million passwords.

What data types were involved? The Snowflake breach involved call and message metadata, not voice or text data. Even so, attackers could use metadata to determine user locations. The cache also included details of those contacted by AT&T customers, another useful identifier.

The second breach included sensitive personal information like full names, postal addresses, and phone numbers. It also featured the encrypted passwords we noted earlier. Combining the two sets could be very powerful in the hands of bad actors.

How did it happen? In the first case, thieves targeted Snowflake’s cloud storage infrastructure. Snowflake suggested that weak authentication processes caused the leak and that the UNC5537 hacking group was responsible.

The second AT&T data breach in 2024 is less clear. AT&T have not released information about the attackers or their mitigation processes. It looks like the password reset only happened after freelance security experts notified the TechCrunch website. Not a good look for AT&T’s internal team.

3. Patelco Credit Union (726,000 individuals)

Patelco is a Bay Area credit union that dates back to 1936 and manages over $9 billion in assets. That history almost ended in June 2024 when the company detected a significant ransomware attack.

The details of the massive data breach are sobering. The company’s initial fraud alert indicates a loss of 726,000 individual records and possible exposure of over 1 million records.

What data types were involved? The Patelco breach involves data about customers and current and former employees. Stolen data includes names, addresses, dates of birth, license numbers, and social security numbers. Credit reports and financial accounts were all put at risk.

How did it happen? According to Patelco, attackers entered the network on May 23 before accessing customer and employee databases on June 29. A ransomware attack then took down the credit union’s online banking, mobile app, and customer service centers, making it hard to resist their demands.

Two months later, the company notified regulators and customers. It also restored banking services after a damaging two-week break and provided support for customers needing an urgent credit report.

The perpetrators are unclear. However, the Dark Web ransomware gang RansomHub lists Patelco on their data brokerage and may have been responsible.

4. Community Clinic of Maui (123,000 individuals)

Attacks against healthcare organizations become more sophisticated yearly as hackers target sensitive personal information. This year, one of the worst attacks affected the Community Clinic of Maui (or Mālama).

According to the Clinic, threat actors accessed patient records between May 4 and May 7 this year. The ransomware attack took systems offline and directly impacted patient care.

The Clinic closed for two weeks, and nurses had to use paper charts for weeks after reopening. It took months to secure digital data and restore usual service.

What data types were involved? Regulatory filings suggest criminals stole social security number data, passport numbers, and names. Even worse, the attack exposed medical histories, biometric data, and financial account data (including CVVs).

How did it happen? Analysis indicates a group called LockBit mounted the attack, as the group announced responsibility in June. Attackers breached cloud storage systems, using ransomware-as-a-service agents to extract valuable data.

5. Infosys (8.5 million records)

Outsourcing company Infosys McCammish Systems announced a major breach on September 6, 2024, potentially affecting 6.5 million records.

According to filings, the attack dated back to late 2023, with attackers active between October and November. There was a long delay between data extraction and discovery.

The effects could be significant, as Infosys serves many massive financial and insurance partners. For instance, the breach exposed thousands of records from Wells Fargo and the Teachers Insurance and Annuity Association of America (TIAA).

What data types were involved? The Infosys breach involved insurance data, creating a critical identity theft risk. Data exposed included SSNs, birth dates, medical treatments, email passwords, state IDs, and driver’s license numbers.

How did it happen? LockBit took responsibility for the Infosys attack. The Russia-linked group implanted ransomware across the Infosys network, locking over 2,000 devices.

6. UnitedHealth (100 million individuals)

Cyberattackers continue to ruthlessly target healthcare companies, including some of America’s biggest operators. In February 2024, TechCrunch reported a breach at UnitedHealth that could impact 100 million customers.

Health and Human Services (HHS) received a filing in October 2024, and investigations continue. If the numbers are accurate, UnitedHealth could be the largest sensitive data breach in US history.

The attack targeted UH’s Change Healthcare payment processing system, deploying ransomware to take systems offline. The results have been crippling for providers reliant on UnitedHealth. Patients have experienced treatment and payment delays, not to mention the risks of identity theft.

What data types were involved? The attack exposed extremely sensitive protected health information (PHI). Records included medical histories, billing data, names and addresses, and financial accounts.

How did it happen? A ransomware collective called ALPHV/BlackCat executed the UnitedHealth attack. The group gained access to Change Healthcare systems, deployed ransomware, and extracted a $22 million bounty. Sadly, they failed to honor the agreement, taking a vast data hoard.

7. Young Consulting (950,000 individuals)

In August, news emerged of another enormous data breach. This time in the financial software sector. Software vendor Young Consulting admitted an attack in early 2024 had compromised almost a million records.

Between April 10 and 13, attackers freely explored the company’s network. They took full advantage, extracting data relating to a Young Consulting client, Blue Shield Insurance.

This was a major headache as Blue Shield is a HIPAA-covered entity. The threat actors subsequently sought to extort money from Young Consulting. Their extortion failed, and criminals made the data available via the Dark Web.

What data types were involved? The attack involved insurance information, including dates of birth, policy numbers, SSNs, and protected medical information like prescriptions and past procedures.

How did it happen? This is the crucial question. We know the attack was mounted by a ransomware group called BlackSuit. BlackSuit specializes in extortion attacks that access and encrypt data. The group posts this data on public websites until target organizations pay up.

8. Ticketmaster (40 million individuals)

In May 2024, data loss affected one of the world’s biggest entertainment companies. Ticketmaster admitted that thieves had extracted data relating to 40 million customers, making it one of the largest breaches in the entertainment sector.

The 1.3TB data haul included identifiable information and earned the attackers around $500,000 within weeks, which is not bad for a few days’ work.

What data types were involved? Attackers stole personal data, including customer names and addresses, payment data, and purchase histories. This unique information is a big deal as it can be used in identity theft and targeted phishing attacks.

How did it happen? Cyberattackers from the ShinyHunters group accessed the Ticketmaster network via a vulnerability in the customer service portal. They then searched for customer data and extracted everything they needed.

The initial vulnerability involved Snowflake’s hosting infrastructure. Attackers hijacked a cloud hosting account, gained access, and used hosting privileges to access a client database. This should concern any organization reliant on cloud hosting.

9. Evolve Bank (7.6 million individuals)

Finance is coming under intense pressure from cyberattackers, as the May 2024 Evolve Bank attack shows. The banking-as-a-service provider reported the security incident in July, describing a classic ransomware scenario.

Attackers accessed the bank’s network, extracted data, and threatened to sell it. When Evolve refused to pay, the cybercriminals followed through, exposing millions of accounts.

According to the bank, attackers did not directly access customer funds (a common feature of 2024 ransomware attacks). Experts attributed responsibility to LockBit, who has had a busy and productive year.

What data types were involved? LockBit always seeks certain data types above others. In the Evolve attack, exposed data included social security numbers, details of financial accounts, and postal addresses.

How did it happen? LockBit tends to launch attacks via ransomware-as-a-service kits. The attack method for Evolve is not known. In the past, LockBit has paid insiders to allow access, exploited VPN vulnerabilities, and compromised cloud infrastructure.

10. Dell (49 million customers and 10,000 employees)

Data breaches affect small startups and veteran companies alike. Few tech companies are as experienced as Dell. Nonetheless, the hardware giant fell victim to two catastrophic breaches in 2024.

In May, Dell admitted losing 49 million customer records between 2017 and 2024. According to the company, the attack did not include personal or financial data but did compromise personal addresses and purchase histories.

In September, a second incident emerged. This time, hackers extracted 3.5GB of confidential employee data.

This attack only affected 10,000 people, but the small number of victims is deceptive. Information about employees is invaluable for phishers seeking to compromise corporate assets. And the data extracted is exactly what they need.

What data types were involved? The first incident exposed previous purchases, home addresses, and customer names. Dell says that the attack did not involve financial data and SSNs.

The second attack included employees’ phone numbers and social security numbers, employee IDs, and their status. It also included data about partners, not just Dell workers.

How did it happen? Details are unclear. Most probably, threat actors posed as IT support, tricking staff into sharing VPN credentials. We know the incidents were revealed by a hacker named “grep,” who claimed to be selling personal data. Experts believe attackers gained access via Atlassian vulnerabilities.

11. Tile (66 million individuals)

Tile is a device tracking service that should improve user security. However, in June, the parent company Life360 admitted to a massive data breach involving Tile’s customer support platform.

Attackers followed the ransomware playbook, demanding a ransom from Life360. Life360 has not disclosed whether it paid.

What data types were involved? The good news is the breach did not include user location data. Unfortunately, hackers extracted customer names, home addresses, email addresses, and phone numbers.

How did it happen? Hackers used a previous employee’s credentials to access a Tile feature designed for law enforcement officers. This provided access to Life360’s data storage systems, potentially allowing attackers to extract personal information about every Tile user.

It appears that Tile lacked effective multi-factor authentication systems. The company may have failed to remove inactive accounts with administrative privileges, leaving the door wide open.

12. Snowflake (Unknown)

We’ve left Snowflake for last as it is like the “mother of all data breaches” in 2024. Snowflake is a major cloud data hosting company specializing in data processing and analysis. It has grown rapidly in the era of Big Data and AI. However, growth and cybersecurity may not be in sync.

As we’ve already seen, Snowflake was involved in some of 2024’s biggest corporate data breaches, including attacks on AT&T and Ticketmaster. In each case, a hacker known as UNC5537 claimed responsibility.

UNC5537’s task was shockingly simple. All it took to steal data from some of the world’s biggest companies was a few stolen credentials. What’s more, the stolen credentials weren’t fresh. Some had been on sale illegally for years.

What data types were involved? Everything. The attack extended to Ticketmaster, AT&T, Santander, AllState, Mitsubishi, and Anheuser-Busch.

How did it happen? Attackers accessed unencrypted user credentials on a Jira instance by exploiting an unsecured device. After that, they used the credentials to access Snowflake’s cloud environment. None of the stolen accounts had MFA enabled, making access simple.

Looking ahead: what might 2025 bring?

In 2024, we dealt with many types of cyber attacks. In 2025, we will most likely see more ransomware attacks, but against a new set of targets.

As the Snowflake attacks show, cloud deployments are a primary target. SaaS vendors need to strengthen their defenses and master access controls. That’s particularly important as AI becomes integrated into cloud operations.

The Snowflake attack exploited reliance on third-party data analysis resources. Many companies also rely on external partners to leverage LLMs and integrate with operational systems. These partners could easily become victims in 2025.

Whatever cybersecurity trends 2025 brings, now is a good time to improve your cybersecurity posture. NordLayer can help you avoid data breaches in the New Year and beyond. 

Our Business VPN and access management tools shield data, secure remote connections, and filter access requests. With our security solutions in your corner, such as traffic encryption and multi-factor authentication (MFA), you can avoid Snowflake-style vulnerabilities and ruin the chances of opportunist data thieves.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×