Why you need to know all the cloud services that your organisation uses – part 2 – (US DoD Nuclear Secrets!)

by | May 31, 2021 | News, Security

People are the weakest link

This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’

It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn. Even worse, their settings were on ‘public’ not ‘private’

It’s a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our new KARE for Security S2 plan helps identify use of these sites in your organisation.

US Soldiers Accidentally Leaked Nuclear Weapons Secrets: Report (gizmodo.com)

Shadow IT

Shadow IT is one of the largest threats to data privacy in organisations today.

It’s not necessarily because these sites are going to be hacked, although that’s always possible, but just because if you don’t know the tools are in use, then there is no way that you can manage them!

The first step to maintaining this data is to identify it! That’s why you need new tools that are cloud focused. If you’re still using the same old security tools that you used to use prior to the cloud, then you are not keeping up and we need to talk!

REWATCH Cyber Lessons from the field.

REWATCH Cyber Lessons from the field.

What can we learn from recent NZ cyber-events? What is real and what is hyperbole? Scroll down for the MFA revelation - it will surprise you!Introducing Campbell McKenzie from Incident Response, the team called in after cyber-events to help clean up and manage the...

The scammers are closing in on us.

The scammers are closing in on us.

Hacks don’t just happen to other people.  The hackers are targeting all of us, every day.  Every day, we have to defend them successfully.  They only have to be successful onceWe all read about stories in the newspaper and there might be a sense of smugness that we...

What do YOU need to know about Juice Jacking? 

What do YOU need to know about Juice Jacking? 

You might get more than you bargained for. That sense of relief when you see a public USB charging point might be misplaced. There are increasing numbers of public USB charging points around. From aircraft and buses to fast-food restaurants, cafes, shopping malls and...

Is your licensing legit?  Don’t be scammed 

Is your licensing legit?  Don’t be scammed 

Don't get fooled! One of the great advantages of subscription software is that the licensing is easier to verify. The days of people copying license codes are over. That makes this scam even more interesting, simply because the product they refer to is subscription...

Even chatGPT gets cyber-security!

Even chatGPT gets cyber-security!

When I asked chatGPT for a poem about cyber-security, here's what it said: (wish I could be as original!) In the land of Aotearoa, where the kauri trees grow tall, Cybersecurity is vital, we must protect our digital all. Patching our systems is the first line of...

Is Cyber-insurance worth it?

Is Cyber-insurance worth it?

Every day we see stories in the newspaper about cyber-attacks. Years agio they seemed a bit remote, but lately they've been getting closer to home.   Many businesses are responding by taking on cyber-insurance.  But is it worth it? When you sign up, you are asked...