Why you need to know all the cloud services that your organisation uses – part 2 – (US DoD Nuclear Secrets!)

by | May 31, 2021 | News, Security

People are the weakest link

This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’

It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn. Even worse, their settings were on ‘public’ not ‘private’

It’s a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our new KARE for Security S2 plan helps identify use of these sites in your organisation.

US Soldiers Accidentally Leaked Nuclear Weapons Secrets: Report (gizmodo.com)

Shadow IT

Shadow IT is one of the largest threats to data privacy in organisations today.

It’s not necessarily because these sites are going to be hacked, although that’s always possible, but just because if you don’t know the tools are in use, then there is no way that you can manage them!

The first step to maintaining this data is to identify it! That’s why you need new tools that are cloud focused. If you’re still using the same old security tools that you used to use prior to the cloud, then you are not keeping up and we need to talk!

Gotcha!

Gotcha!

"GROUP-IB" are a Singapore-based cyber-security provider.   They go deep into the cyber-crime sphere and it's paid off. After 30+ attacks, and over $US30M stolen, "OPERA1ER" have been caught! They describe a bad actor who, from 2019, had used the same MO over and...

Look before you click

Look before you click

The latest trend in phishing is pictures! It might be a thumb nail of a picture - a cute pet, interesting garden scene, or some other curiosity. It might be in the form of advertisement.   Maybe it is offering a time sensitive, and urgent deal.   It might even be a...

REWATCH Cyber Lessons from the field.

REWATCH Cyber Lessons from the field.

What can we learn from recent NZ cyber-events? What is real and what is hyperbole? Scroll down for the MFA revelation - it will surprise you!Introducing Campbell McKenzie from Incident Response, the team called in after cyber-events to help clean up and manage the...

The scammers are closing in on us.

The scammers are closing in on us.

Hacks don’t just happen to other people.  The hackers are targeting all of us, every day.  Every day, we have to defend them successfully.  They only have to be successful onceWe all read about stories in the newspaper and there might be a sense of smugness that we...

What do YOU need to know about Juice Jacking? 

What do YOU need to know about Juice Jacking? 

You might get more than you bargained for. That sense of relief when you see a public USB charging point might be misplaced. There are increasing numbers of public USB charging points around. From aircraft and buses to fast-food restaurants, cafes, shopping malls and...

Is your licensing legit?  Don’t be scammed 

Is your licensing legit?  Don’t be scammed 

Don't get fooled! One of the great advantages of subscription software is that the licensing is easier to verify. The days of people copying license codes are over. That makes this scam even more interesting, simply because the product they refer to is subscription...