Amazon’s S3 servers are proving to be distinctly leaky. Security advisers have identified that over a third of its cloud storage buckets appear to be unencrypted, and 7% are currently exposed online.
Already this year, S3’s misconfiguration has resulted in several data breaches, including high profile leaks at Wells Fargo, Time Warner and Viacom. It is also responsible for the exposure of half a million drivers’ personal details, though their car tracking devices.
The fault appears to lie with users failing to activate all available security measures; due to time constraints, misuse or apathy. To avoid springing a leak, organisations using S3 should check that their servers are secure.