Why you need to know all the cloud services that your organisation uses – part 2 – (US DoD Nuclear Secrets!)

by | May 31, 2021 | News, Security

People are the weakest link

This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’

It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn. Even worse, their settings were on ‘public’ not ‘private’

It’s a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our new KARE for Security S2 plan helps identify use of these sites in your organisation.

US Soldiers Accidentally Leaked Nuclear Weapons Secrets: Report (gizmodo.com)

Shadow IT

Shadow IT is one of the largest threats to data privacy in organisations today.

It’s not necessarily because these sites are going to be hacked, although that’s always possible, but just because if you don’t know the tools are in use, then there is no way that you can manage them!

The first step to maintaining this data is to identify it! That’s why you need new tools that are cloud focused. If you’re still using the same old security tools that you used to use prior to the cloud, then you are not keeping up and we need to talk!

Oh no, the worst has happened! Now what? 

Oh no, the worst has happened! Now what? 

When we talk to people about the different risks that their organisation might face, one of the events that has the highest likelihood, and would have the biggest impact, is a significant cyber-event. The worst-case scenario would be a ransomware event, where the bad...

What is Malvertising?

What is Malvertising?

Malvertising is appearing more frequently on search engines. More people are starting to experience frustration with search engines, partly due to occasional inaccuracies in AI-driven overlays and an excess of advertisements. Another emerging concern is “malvertising”...

Check out the NZ 2024 SME Cyber Behaviour Tracker

Check out the NZ 2024 SME Cyber Behaviour Tracker

As cyber threats proliferate, small businesses find themselves not just in the crosshairs but also facing the daunting financial repercussions of a breach. There is an urgent need for robust cyber security measures. With the staggering average cost of $173,000 per...

Urgent Security Advisory (from Microsoft)

Urgent Security Advisory (from Microsoft)

We have been alerted to an issue with some Microsoft Office products.  The vulnerability is reported to be actively exploited and we expect Microsoft will expedite the release of fixes.  Zero-day means that this is an immediate high risk and we are advised that it is...

Free resource: Business Cloud Security Checklist

Free resource: Business Cloud Security Checklist

Essential Business Cloud Security Checklist for 2024 In today’s digital age, securing your business’s cloud environment is more critical than ever. With cyber threats evolving rapidly, it’s essential to have a robust cloud security strategy. Here’s a checklist to help...

TeamViewer Compromise

TeamViewer Compromise

TeamViewer is a common piece for software that allows IT businesses to remotely access, control, manage, monitor, and repair devices – from laptops and mobile phones to industrial machines and robots. Many software vendors include it to allow them to remotely support...