Why you need to know all the cloud services that your organisation uses – part 2 – (US DoD Nuclear Secrets!)

by | May 31, 2021 | IT News & Insights New Zealand | Cybersecurity, AI & Microsoft Updates, Security

People are the weakest link

This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’

It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn. Even worse, their settings were on ‘public’ not ‘private’

It’s a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our new KARE for Security S2 plan helps identify use of these sites in your organisation.

US Soldiers Accidentally Leaked Nuclear Weapons Secrets: Report (gizmodo.com)

Shadow IT

Shadow IT is one of the largest threats to data privacy in organisations today.

It’s not necessarily because these sites are going to be hacked, although that’s always possible, but just because if you don’t know the tools are in use, then there is no way that you can manage them!

The first step to maintaining this data is to identify it! That’s why you need new tools that are cloud focused. If you’re still using the same old security tools that you used to use prior to the cloud, then you are not keeping up and we need to talk!

Webinar Replay – Securing the Mobile Frontier: Cybersecurity Essentials for Phones and Tablets for Modern Businesses

Webinar Replay – Securing the Mobile Frontier: Cybersecurity Essentials for Phones and Tablets for Modern Businesses

As mobile devices become the backbone of modern business operations, they also present a growing target for cyber threats.  Apple or Android - they're both important.  Every time you use these to access your Teams, Email or anything else, you are relying on them to be...

Webinar Replay – 5 mistakes people often make with passwords and how to overcome them

Webinar Replay – 5 mistakes people often make with passwords and how to overcome them

Passwords are the first line of defence against cyber threats. However, many people still make common mistakes that leave their accounts vulnerable. Watch this video for a 30-minute webinar where we will discuss the most frequent password pitfalls and how to avoid...