menu
close
close

Experienced a potential cyberattack or suspicious activity?

What are you looking for?
close
  • published 3/11/26 6:38 AM
  • updated
  • 5 MIN

CSC emphasizes the importance of secure cloud storage

Card Image

As part of the weekly awareness campaign of the "Cyber Pulse" initiative launched by the Cyber Security Council (CSC), the Council emphasized the critical importance of cloud storage in addressing the growing digital and cyber threats. In its weekly awareness message, the “Cyber Pulse” campaign highlighted that cloud storage enables individuals and users to reduce risks, limit fraudsters’ access to user data, and safeguard personal information.

 

The Council also pointed out several common cloud storage mistakes that individuals must avoid to protect their personal and financial data in cyberspace. The weekly campaign noted out the most prominent errors which include; granting excessive identity and access management permissions, failing to enable multi-factor authentication, overreliance on public cloud storage that may expose sensitive data and facilitate the spread of malware, misconfigured security settings that leave critical systems vulnerable, absence of encryption (both at rest and in transit), and downloading applications without verifying their source or security standards, These mistakes expose many users to significant risks that directly threaten their digital security.

 

CSC stressed the importance of reviewing all settings on mobile phones and personal devices. It also outlined several measures to secure digital cloud environments, most notably the use of a VPN when connecting to public or open networks. Furthermore, the Council emphasized the necessity of encrypting personal and financial data before uploading it to the cloud, enabling two-factor authentication to prevent cyber breaches or fraud, and using strong passwords.

 

The weekly awareness campaign indicated that approximately 70% of cloud breaches result from misconfigurations, adding that 60% of organizations expected to strengthen their cloud security configurations by 2026. It warned that poor cloud storage practices may lead to data breaches, unauthorized access, major privacy violations, data theft, espionage on user activity, and broader compromises of personal privacy and security.

 

The Council also provided a set of recommendations for staying safe while using cloud services, including relying on trusted and secure cloud providers, enabling encryption, regularly reviewing security settings, permissions and access controls, and strengthening overall cloud protection. In its weekly awareness message under the "Cyber Pulse" campaign, the Council stressed that untrusted cloud services are among the leading sources of malware distribution worldwide. Such services may serve as channels for malicious applications, some of which operate in the background without the user’s knowledge, collecting data or transmitting it to unknown entities. Even more concerning, a single insecure application may be sufficient to enable a full device compromise, underscoring the importance of digital awareness and caution when downloading any new application.

 

The “Cyber Pulse” awareness campaign launched by the Cyber Security Council and now in its second consecutive year across social media platforms, forms part of the United Arab Emirates’ ongoing efforts to build a secure cyberspace that protects users from escalating digital threats and keeps pace with rapid technological advancements. This initiative aligns with a comprehensive national vision to strengthen trust in the country’s digital ecosystem, promote cyber security culture, enhance digital awareness among families and individuals, and reinforce cyber security practices to ensure the safety and privacy of citizens and residents in an era of accelerated digital transformation.

Summary
As part of the weekly awareness campaign of the ‘Cyber Pulse’ initiative launched by the Cyber Security Council, the Council highlighted the critical importance of cloud storage in addressing the growing digital and cyber threats. In its weekly awareness message, the campaign highlighted that cloud storage enables individuals and users to reduce risks, limit fraudsters’ access to user data, and safeguard personal information. The Council also pointed out several common cloud storage mistakes that individuals must avoid to protect their personal and financial data in cyberspace. The weekly awareness campaign noted that the most prominent of these mistakes include granting excessive identity and access management permissions, failing to enable multi-factor authentication, overreliance on public cloud storage that may expose sensitive data and facilitate the spread of malware, misconfigured security settings that leave critical systems vulnerable, absence of encryption (both at rest and in transit), and downloading applications without verifying their source or security standards. These mistakes expose many users to significant risks that directly threaten their digital security.

Stay Connected

Follow our channels
Follow our social media channels to stay up to date.
Social Icon Social Icon Social Icon Social Icon Social Icon

TAKE ACTION

Spread Awareness

Share this news to spread valuable information and help others stay updated.

More Updates

News

Abu Dhabi – April 2026

CSC calls for protecting and safeguarding digital identity

As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council emphasized the importance of digital identity, noting that it is one of the most valuable assets owned by individuals and organizations. The Council highlighted that nearly 97% of cyberattacks target passwords, while around 40% of social media users worldwide have either been compromised or have unintentionally shared personal data. It further warned that the consequences of a digital identity breach extend beyond data loss to include identity theft, fraud, financial losses, and negative impacts on personal and professional reputation. During the first half of the year, indicators also showed a significant increase of 32% in cyberattacks targeting digital identities, amid the growing reliance on digital services and smart applications. To strengthen protection, users are advised not to share sensitive personal information, to use strong and complex passwords, and to enable multi-factor authentication. These steps constitute the first line of defense against growing threats.

Informing

Corporations, Individuals & Families

News

Abu Dhabi – April 2026

CSC Stresses the Need to Ensure Safe Internet Browsing

As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council noted that cyber threats have become increasingly complex and widespread, driven by the growing reliance on the internet in various aspects of daily life. More than 750,000 browsing sessions are recorded daily, reflecting the vast scale of digital activity. Each browsing session represents an opportunity for targeting users through malware or fraudulent webpages, especially given the reliance on the internet for financial transactions, government services, and social communication. The Council affirmed that browser security technologies serve as a technical shield that protects users while browsing. These technologies include encryption, isolation, and preventive policies designed to prevent breaches, data leakage, and unauthorized tracking. Key guidelines to enhance browsing security include verifying links before clicking, regularly updating browsers, and avoiding downloads from untrusted sources.

Informing

Corporations, Individuals & Families

News

Abu Dhabi – April 2026

CSC highlight the importance of inspection and cleaning of electronic devices

As part of the weekly awareness campaign of the “Cyber Pulse” initiative, the Cyber Security Council stressed the importance of regular inspection and cleaning of electronic devices such as mobile phones and personal tablets, noting that these practices can reduce cyber incidents by up to 30%. The Council explained that the accumulation of unnecessary files and data makes it easier for malicious software to infiltrate devices, thereby increasing cyber risks and exposing users to potential data loss or privacy breaches. Key signs that a device may require cleaning include slow performance, unusual messages or recurring errors, full storage capacity, and the presence of unknown or unused applications. Therefore, it is important to adopt a simple digital cleaning routine that can significantly enhance device security. This routine includes using trusted security software, deleting unnecessary files and applications, and regularly updating operating systems and software to address vulnerabilities and enhance performance.

Informing

Corporations, Government, Individuals & Families