We often find problems with client configurations when we take over jobs, particularly when less-technically-able client try to do-it-themselves. If anyone needs an example as to why getting things set up correctly is difficult, Microsoft made a mistake with a server config and exposed some of their client’s information: Microsoft …
Data Sovereignty. You should get involved…
So I have just finished reading this piece, on The Register: Just how critical is data sovereignty? • The Register It is sponsored by Intel and is collecting research information on how organisations think about their data sovereignty. Not sure what data sovereignty is? Here is an example, you collect …
Continue reading “Data Sovereignty. You should get involved…”
NHS August ransomware attack – data was stolen as well
Advanced, the NHS supplier at the centre of the August cyber-attack, were quick to go to press with their success of containing and limiting the reach of the ransomware attack. However now, after a considered investigation, whilst confining the attack, the threat actors exfiltrated data from the systems: It was …
Continue reading “NHS August ransomware attack – data was stolen as well”
The Optus hack – UPDATED 29 September 2022
I started writing about this hack on 27 September 2022 Update 29 September 2022 Here is the take from the BBC: Optus: How a massive data breach has exposed Australia – BBC News Update 28 September 2022 This is becoming a very odd story – millions of bit of personal …
Continue reading “The Optus hack – UPDATED 29 September 2022”
At last, the real issue when big (or small) companies get hacked and control of collected PII is lost…
If you force all of your users to register to use the device or features, they have purchased and as part of that compulsory registration you collect sensitive and personally identifiable information – then make sure your cyber security is up to the job of protecting this information. Samsung is …