data Archives - IT Security Guru https://www.itsecurityguru.org/tag/data/ The Site for our Community Fri, 24 Mar 2023 15:21:52 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png data Archives - IT Security Guru https://www.itsecurityguru.org/tag/data/ 32 32 TikTok to be banned from UK Government Phones https://www.itsecurityguru.org/2023/03/17/tiktok-to-be-banned-from-uk-government-phones/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-to-be-banned-from-uk-government-phones Fri, 17 Mar 2023 11:37:04 +0000 https://www.itsecurityguru.org/?p=48003 The UK has announced a ban on TikTok on government phones, becoming the latest country to have banned the Chinese-owned video app over raised security concerns. The microscope has been on TikTok in recent months and has come under increased scrutiny due to fear is that user data from the app owned by Beijing-based company […]

The post TikTok to be banned from UK Government Phones appeared first on IT Security Guru.

]]>
The UK has announced a ban on TikTok on government phones, becoming the latest country to have banned the Chinese-owned video app over raised security concerns.

The microscope has been on TikTok in recent months and has come under increased scrutiny due to fear is that user data from the app owned by Beijing-based company ByteDance could end up in the hands of the Chinese government.

The ban is in place with immediate effect following a security review ordered by ministers and is part of a wider range of restrictions brought in for third-party apps on government devices. The strict measures have been brought in to improve cyber hygiene, protect sensitive data that government officials have access to as well to prevent location data harvesting.

In recent months, many countries have brought in law to ban TikTok from government-owned devices including the US, Canada and the European Commission.

When the announcement was made, the cybersecurity community was quick to provide thoughts and insight…

Javvad Malik, lead security awareness advocate at KnowBe4:

It appears as if the UK is following in the steps of the European unions ban on TikTok on government devices. Risk assessments need to be undertaken and any apps which pose a threat to the government should be removed. However, there is a lack of transparency in these efforts and no real indication is given as to the actual data which is collected by TikTok and who it is shared with and for which purposes. If we were to apply this principle to other social media sites, and mobile apps in general, then many of the apps would not pass this bar. If there is a political risk, then this should be stated so that others can make informed risk decisions too, rather than using the blanket term that is being done for cybersecurity reasons – because most apps will collect data and transmit it to third parties. 

Tom Davison, Senior Director Engineering International at Lookout:

If this ban goes ahead it will follow similar decrees already issued by the European Commission and the US government. The concern here is the level of access to data which TikTok affords its parent company ByteDance, which is a Chinese company headquartered in Beijing. Governments and businesses are increasingly concerned by the volume of data which 3rd parties and foreign states might be collecting. 
Mobile apps in particular are a real source of risk given the the amount and type of data they are able to collect on their users. Upwards of 60% of internet traffic now originates from mobile devices making them the prime target for data collection and surveillance. Increasingly users mix personal and work apps on the same device, drastically increasing the risks for governments and business who are tasked with controlling data sovereignty, privacy and protection. All mobile apps will be sending data somewhere and it is essential that this is understood and considered. For example, Lookout tracks over 9 million other apps that have the capability to send data to China. While they may not necessarily be malicious there is a fundamental issue of lack of awareness which is only just beginning to be acknowledged.
Brian Higgins, Security Specialist at Comparitech:

“The National Cyber Security Centre publishes advice on drafting and implementing ‘Bring Your Own Device’ and ‘Acceptable Use’ policies so why they don’t have any for Government staff is unclear. Most Social Media platforms gather vast amounts of data that users would rather they didn’t, but personal choice allows individuals to trade their privacy for functionality. They really shouldn’t be allowed to apply the same approach whilst they are engaged in Government business at any level. We’re clearly jumping on the Bad-TikTok bandwagon here but a more useful exercise would be to review and restrict Social Media access across the estate.” 

Chris Handscomb, EMEA Solutions Engineer at Centripetal

Just a decade ago, the notion of corporate managers and government officials possessing smart mobile devices that could instantly access work information was a novelty. Today, these devices are ubiquitous, internet speeds have vastly improved, enabling individuals to consume copious amounts of high-quality content at the click of a finger.However, with this heightened connectivity, communication, and entertainment, there is the possibility of malicious actors exploiting device vulnerabilities and gathering sensitive data. This sometimes very personal data can then be on-sold to the highest bidder creating a risk factor for companies and government agencies where (potentially compromised) individual contributors are handling sensitive trade or state secrets and may now be vulnerable to blackmail.It is therefore imperative that companies and government agencies prioritise their security measures, safeguarding their employees and enterprises from potential threats.

The post TikTok to be banned from UK Government Phones appeared first on IT Security Guru.

]]>
Snapchat Phishing Scam: 55,000 users Compromised https://www.itsecurityguru.org/2018/02/19/snapchat-phishing-scam-55000-users-compromised/?utm_source=rss&utm_medium=rss&utm_campaign=snapchat-phishing-scam-55000-users-compromised Mon, 19 Feb 2018 14:31:02 +0000 http://www.itsecurityguru.org/?p=25461 More than 55,000 Snapchat users had their login details exposed online thanks to a clever phishing scam. Read Full Story  ORIGINAL SOURCE: The Sun

The post Snapchat Phishing Scam: 55,000 users Compromised appeared first on IT Security Guru.

]]>
More than 55,000 Snapchat users had their login details exposed online thanks to a clever phishing scam.

Read Full Story 

ORIGINAL SOURCE: The Sun

The post Snapchat Phishing Scam: 55,000 users Compromised appeared first on IT Security Guru.

]]>
Turla Targets Post Soviet States https://www.itsecurityguru.org/2018/01/10/turla-targets-post-soviet-states/?utm_source=rss&utm_medium=rss&utm_campaign=turla-targets-post-soviet-states Wed, 10 Jan 2018 16:07:31 +0000 http://www.itsecurityguru.org/?p=25022 Russian linked hackers Turla have been targeting consulates in post- Soviet states by using a new tool which uses malware to steal sensitive information, according to recent ESET research. View Full Story  ORIGINAL SOURCE: IB Times

The post Turla Targets Post Soviet States appeared first on IT Security Guru.

]]>
Russian linked hackers Turla have been targeting consulates in post- Soviet states by using a new tool which uses malware to steal sensitive information, according to recent ESET research.

View Full Story 

ORIGINAL SOURCE: IB Times

The post Turla Targets Post Soviet States appeared first on IT Security Guru.

]]>
Data Protection Bill Amended to Protect Security Researchers https://www.itsecurityguru.org/2018/01/10/data-protection-bill-amended-protect-security-researchers/?utm_source=rss&utm_medium=rss&utm_campaign=data-protection-bill-amended-protect-security-researchers Wed, 10 Jan 2018 16:03:38 +0000 http://www.itsecurityguru.org/?p=25019 The Government is to amend the data protection bill, in order to protect researchers who work to uncover cyber criminals, after fears were raised that the bill would accidentally criminalize legitimate research. View Full Story  ORIGINAL SOURCE: The Guardian

The post Data Protection Bill Amended to Protect Security Researchers appeared first on IT Security Guru.

]]>
The Government is to amend the data protection bill, in order to protect researchers who work to uncover cyber criminals, after fears were raised that the bill would accidentally criminalize legitimate research.

View Full Story 

ORIGINAL SOURCE: The Guardian

The post Data Protection Bill Amended to Protect Security Researchers appeared first on IT Security Guru.

]]>
Hackers adopt ‘school of fish’ approach as they sharpen focus on mid-sized businesses https://www.itsecurityguru.org/2018/01/09/hackers-adopt-school-fish-approach-sharpen-focus-mid-sized-businesses/?utm_source=rss&utm_medium=rss&utm_campaign=hackers-adopt-school-fish-approach-sharpen-focus-mid-sized-businesses Tue, 09 Jan 2018 17:00:25 +0000 http://www.itsecurityguru.org/?p=25011 Rudimentary attacks, like information gathering, reputation blocks, fraud, and brute force attacks, increased by 71% from 2016-2017, according to new data released by eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider. The data represents a total volume rise in detected events from 15 million in 2016, to 21 million last year. Reports […]

The post Hackers adopt ‘school of fish’ approach as they sharpen focus on mid-sized businesses appeared first on IT Security Guru.

]]>
Rudimentary attacks, like information gathering, reputation blocks, fraud, and brute force attacks, increased by 71% from 2016-2017, according to new data released by eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider. The data represents a total volume rise in detected events from 15 million in 2016, to 21 million last year.

Reports demonstrate a marked technique shift by attackers who favor obfuscation techniques that evade standard perimeter controls. The data, collected from eSentire’s best-in-class threat monitoring technologies, spans thousands of private and public cloud sources across the company’s 600+ client base, and includes primarily mid-sized businesses in the finance, legal, healthcare, technology, and insurance industries.

“It’s not that businesses don’t need prevention technologies, rather, you need to be able to detect when those technologies are being bypassed and intervene immediately,” said J.Paul Haynes, eSentire CEO.

In its 2017 Market Guide for Managed Detection and Response Services, Gartner states that: “Organizations are looking to improve real-time threat detection and incident response capabilities; however, they often struggle to invest limited resources in the required people, processes and technology. Managed detection and response improves threat detection monitoring and incident response capabilities via a turnkey approach to detecting threats that have bypassed other controls.”1

“Last year’s monster breaches, like WannaCry, affected countless mid-sized businesses, and since those attacks, we’ve seen a steady rise in organizations proactively seeking measures to safe-guard against similar attacks,” said Haynes. “Mid-sized enterprises have similar cyber risk profiles to large enterprises, yet a fraction of the budget to invest in detection and responses capabilities.”

MDR is the fastest growing segment in cybersecurity as firms of all sizes struggle to acquire and retain the threat hunting skills, advanced cyber technologies, and threat intelligence processes to continuously anticipate the next move the ‘school of fish’ is making.

“This new data supports an existential problem when it comes to defending against threats,” said Haynes. “Early breach indicators are measured in minutes and hours, and countermeasures need to be deployed in near real-time. In our world, it is not the 200+ days to detect which you read in the headlines, it’s now!”

As the largest pure-play MDR provider, eSentire saw significant market expansion in 2017, with in excess of 60% year-over-year revenue growth. Today, the company maintains a 97% customer retention rate.

“At the end of the day, while the volume of attacks continues to rise, combining endpoint, network, and threat intelligence data equips eSentire’s threat hunters with the richest possible data allowing faster decision making, investigations, and the ability to disrupt attacks,” said Haynes. “Ultimately, businesses need to avoid greater financial losses and need more than traditional prevention technologies to achieve that.”

About eSentire:
eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24×7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than $5 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire.

The post Hackers adopt ‘school of fish’ approach as they sharpen focus on mid-sized businesses appeared first on IT Security Guru.

]]>
Perth Airport Hacked https://www.itsecurityguru.org/2017/12/11/perth-airport-hacked/?utm_source=rss&utm_medium=rss&utm_campaign=perth-airport-hacked Mon, 11 Dec 2017 15:14:03 +0000 http://www.itsecurityguru.org/?p=24818 A hacker has managed to break into Perth International Airports computer system and has stolen a significant amount of valuable, sensitive data. View Full Story  ORIGINAL SOURCE: IB Times

The post Perth Airport Hacked appeared first on IT Security Guru.

]]>
A hacker has managed to break into Perth International Airports computer system and has stolen a significant amount of valuable, sensitive data.
View Full Story 
ORIGINAL SOURCE: IB Times

The post Perth Airport Hacked appeared first on IT Security Guru.

]]>
Millions of Brit's Unaware their Details have been Hacked https://www.itsecurityguru.org/2017/12/07/millions-brits-unaware-details-hacked/?utm_source=rss&utm_medium=rss&utm_campaign=millions-brits-unaware-details-hacked Thu, 07 Dec 2017 14:55:46 +0000 http://www.itsecurityguru.org/?p=24814 Millions of British victims are unaware that their personal details have been stolen. Read Full Story  ORIGINAL SOURCE: Standard

The post Millions of Brit's Unaware their Details have been Hacked appeared first on IT Security Guru.

]]>
Millions of British victims are unaware that their personal details have been stolen.
Read Full Story 
ORIGINAL SOURCE: Standard

The post Millions of Brit's Unaware their Details have been Hacked appeared first on IT Security Guru.

]]>
20,000 Patients Compromised by Henry Ford Data Breach https://www.itsecurityguru.org/2017/12/07/20000-patients-compromised-henry-ford-data-breach/?utm_source=rss&utm_medium=rss&utm_campaign=20000-patients-compromised-henry-ford-data-breach Thu, 07 Dec 2017 14:32:30 +0000 http://www.itsecurityguru.org/?p=24809 Henry Ford Health System has announced this week a data breach of systems has resulted in data from 20,000 patients being compromised. Read Full Story  ORIGINAL SOURCE: Freep

The post 20,000 Patients Compromised by Henry Ford Data Breach appeared first on IT Security Guru.

]]>
Henry Ford Health System has announced this week a data breach of systems has resulted in data from 20,000 patients being compromised.
Read Full Story 
ORIGINAL SOURCE: Freep

The post 20,000 Patients Compromised by Henry Ford Data Breach appeared first on IT Security Guru.

]]>
Mecklenburg County held to Ransom https://www.itsecurityguru.org/2017/12/07/mecklenburg-county-held-ransom/?utm_source=rss&utm_medium=rss&utm_campaign=mecklenburg-county-held-ransom Thu, 07 Dec 2017 14:08:37 +0000 http://www.itsecurityguru.org/?p=24807 Mecklenburg, North Carolina’s more populous metro areas, came to a halt as a cyberattack froze data on dozens of the countys servers. Attackers are asking for $23,000 payment. Read Full Story  ORIGINAL SOURCE: Daily Mail

The post Mecklenburg County held to Ransom appeared first on IT Security Guru.

]]>
Mecklenburg, North Carolina’s more populous metro areas, came to a halt as a cyberattack froze data on dozens of the countys servers. Attackers are asking for $23,000 payment.
Read Full Story 
ORIGINAL SOURCE: Daily Mail

The post Mecklenburg County held to Ransom appeared first on IT Security Guru.

]]>
Employer is Liable for Data Breach caused by Employee https://www.itsecurityguru.org/2017/12/05/employer-liable-date-breach-caused-employee/?utm_source=rss&utm_medium=rss&utm_campaign=employer-liable-date-breach-caused-employee Tue, 05 Dec 2017 15:33:46 +0000 http://www.itsecurityguru.org/?p=24791 The High court has found an employer to be liable for actions by an employee, which resulted in data being leaked. Read Full Story  ORIGINAL SOURCE: Lexology

The post Employer is Liable for Data Breach caused by Employee appeared first on IT Security Guru.

]]>
The High court has found an employer to be liable for actions by an employee, which resulted in data being leaked.
Read Full Story 
ORIGINAL SOURCE: Lexology

The post Employer is Liable for Data Breach caused by Employee appeared first on IT Security Guru.

]]>