Data Security

Topics relating to protecting the access to or integrity of data.


OpenText Announces Theme and Keynote Speakers for Enfuse Conference

PaperFree partner OpenText today announced details about their upcoming Enfuse conference, to be held in Las Vegas, Nevada May 21-24.  This year's theme of the annual security, digital investigation, and e-Discovery conference is "Bringing security to the edges of the network and beyond".  Keynote speakers include OpenText Vice Chair, CEO and CTO Mark Barrenechea and James Comey, Director of the Federal Bureau of Investigation (FBI) (2013-2017).  In the opening keynote, Mr.

OpenText Announces Release 16 Enhancement Pack 4

PaperFree partner OpenText recently announced OpenText Release 16 Enhancement Pack 4, a update that addresses security, artificial intelligence, and Internet of Things, and cloud capabilities of their core EIM platform.  This newly-available release eases the transition to hybrid or fully managed cloud environments for enterprises and features cloud connectors to fully integrate OpenText solutions at the core of the workflow, even while working seamlessly with other technology solutions.  

Enhancement Pack 4 includes the following features:

6 Steps for Patch Management

Any IT professional knows that keeping system patches up to date is critical, especially since patches address critical functions like security and stability.  With recent security issues such as Spectre and Meltdown, the importance of patches is becoming more important, but even patches pose risks at times.  It takes an informed IT team to manage which patches are appropriate and what techniques are needed to install them.

Microsoft Adds Ransomware Protections to OneDrive and Outlook

Ransomware is a menace to data security - locking up a user's files and throwing away the key until a ransom is paid - and it's now showing up in the cloud.  Microsoft is working to remedy this with new protections for business and personal OneDrive accounts, including the ability to revert back to previous images of a user's account, up to a month in the past.  This is a measure that helps users easily recover from compromises without the need of professionals, however it does require users to act before that month's time is up.  Helpfully, Microsoft is also installing monitoring utilities

Amazon Cloud Services Hacked to Mine Cryptocurrency

Tesla, the manufacturer of popular electric vehicles and an even more popular orbiting Roadster, recently announced that its Amazon Web Services account was hacked and used to mine cryptocurrency.  The company was first informed of the breach by cybersecurity firm RedLock, who found the compromise while simply surveying Tesla's platform for vulnerabilities as part of Tesla's bug bounty program (RedLock was compensated for their find).  The breach was sourced to a simple IT administrative console that didn't have a password, though Tesla has not been able to determine who was behind the atta

Strava Fitness Tracker Reveals Locations of US Military Bases

Strava, a social networking app for tracking one's workouts, serves a great purpose in tracking activity and comparing it to friends, but the platform revealed a major security issue over the weekend when it released a heatmap of a billion 2017 user workouts, and in the process revealed several classified military bases that users had jogged around.  These bases, in Turkey, Syria, and Yemen weren't the only sensitive locations shown - other installations from Russia, China, and Taiwan popped up too.  However, the demographics of the app lean heavily western, young, and active, which means i

Ransomware has the Cloud in its Sights

Data breaches in recent years have shown the risk that data always faces, and that risk is on the horizon of expanding.  Now, cloud storage services appear to be in the crosshairs of ransomware attacks, according to MIT research.  Cloud services often hold extensive libraries of data, often personal information, which makes them an ideal target for a hacker payday and notoriety.  Though larger cloud vendors such as Google and Amazon have anticipated this risk and have the resources to put safeguards in place, most at risk are the smaller cloud services who would be more likely to pay up.  A

25% of the Nearly Two Billion Stolen Google Passwords Still Work

According to new research by Google and Berkeley, there are "hundreds of millions" of pieces of stolen login information traded on hacker forums and the dark web - and some of it still works.  This research used Googles own internal data for analysis, and researchers estimated that up to 25% of these credentials are still current and their associated accounts exposed.  According to the report: "Through a combination of password re-use across thousands of online services and targeted collection, we estimated 7–25% of stolen passwords in our dataset would enable an attacker to log in to a vic

Girl Scouts of the USA Partners with Palo Alto Networks to Teach Scouts Cybersecurity

Recognizing an opportunity to teach scouts real-world skills, the Girl Scouts of the USA has recently partnered with Palo Alto Networks to develop a program consisting of 18 earnable badges to teach scouts cybersecurity skills.  Girl Scout badges are insignia awarded to scouts once they have completed requirements to develop mastery of a given topic - and the number of possible badges available across all levels of scouts numbers in the hundreds.