Post navigationTwo-thirds of cloud attacks could be stopped by checking configurations, research finds