Last week at Black Hat in Las Vegas, IT security firm Imperva discussed a “man-in-the-middle” attack that affects certain enterprise file-sync-and-share (EFSS) services, allowing hackers access to files transferred into the cloud. This is a very relevant and interesting vector of attack for EFSS services.
Wireless encryption is a security tool to protect a company’s network. The word “encryption” means to turn something into code. When IT professionals use wireless encryption, they are encoding the messages sent between a computer’s wireless adapter and a wireless router.
The term “data at rest” refers to data in computer storage. Its opposite is data in motion, which is a phrase used to describe data traversing a network. It can even apply to information temporarily residing in a computer’s memory.
In August 2014, the digital security company Websense released a report stating that more than one-third of Canadian IT professionals knew for certain that their company’s data had been the victim of a serious breach.
In what is beginning to appear as a weekly occurrence, another major retailer has announced they have been a victim of a data breach. Late last week, Sears-owned discount department store Kmart, quietly announced via a Securities and Exchange Commission filing that the brand had suffered a breach through its point of sale (PoS) systems which were ultimately comprised by malicious software.
At WinMagic data protection is our strong suit and we often talk about it on this blog. At the same time it’s good to remember that ensuring security of data at rest using encryption and strong key management are just two important aspects of the larger picture of data security. In my next few posts I’d like to expand on other challenges an enterprise faces as part of the larger picture, the solutions and technologies that address those challenges and their potential links to encryption and key management.
Last week we announced upcoming improvements to SecureDoc that we plan to deliver in the April timeframe. These enhancements include support for BitLocker and TCG Enterprise drives and we’re really excited about the value these new solutions will ultimately deliver to customers.
TPMs have been shipping for nearly 8 years now. WinMagic was an early adopter and supported TPM version 1.1 for full disk encryption before most. We expanded our support to the more main stream version 1.2 TPMs when they started shipping. Now more than 100 Million TPMs are out there in laptops and other devices, and soon many, many Version 2.0 TPMs will join them. TPM 2.0 and disk encryption will be a good topic for a future blog but today I am going to set the ground work on where we are today.
Over the weekend Bell announced that more than 22,000 SMB customers’ user data was compromised and posted online. So what was the source of the breach? A third-party supplier.