Among the most important lessons is recognizing that while the data was stored in Amazon Web Services, that doesn't mean it was Amazon's fault, according to Ameesh Divatia, co-founder and CEO of data protection firm Baffle.
Read more: A professional hacker reveals how to create the best possible password
In short, Amazon Web Services rents functionally unlimited supercomputing power to anybody with a credit card, from individual developers up to behemoths like Capital One. According to the criminal complaint against Thompson, Amazon's cloud storage itself was never directly breached — rather, she took advantage of a "firewall misconfiguration" in how Capital One set up its cloud infrastructure to steal customers' information.
Divatia says this speaks to a common misconception held by customers of AWS and other major cloud platforms: That Amazon will handle everything. Rather, Divatia says, remember that the burden of actually locking down the data stored in that cloud largely belongs to the customer.
"Step one in terms of mitigating these issues is [to] get out of this false sense of security that cloud users have, that Amazon will take care of it," says Divatia.
Preventing malicious actors from stealing personal data involves more than just keeping attackers out of the servers that contain sensitive information, though. It's also about ensuring that if criminals do find a way in, the data is sufficiently safeguarded and effectively useless to them.
That involves encrypting data at all stages, whether it's in the customer's own servers or in the cloud, says Divatia. Capital One said in a press release that it encrypts its data as standard operating practice, but that in this case, the unauthorized user was able to decrypt it.