Mon.Nov 04, 2019

Data Ethics – The Profound Impacts of New Technology

Perficient Data & Analytics

Data ethics and security have been around a long time – as long as data. Constantly evolving. But, continued tech advancement has made a profound impact. So, data security and data ethics is more important than ever. Magnified Relevance. Tech has enabled an exponential increase of data.

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

The Last Watchdog

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

BlueKeep Attacks Arrive, Bearing Cryptomining Malware

Data Breach Today

Exploit Isn't a Worm, but Experts Remain Braced for Mayhem The cybersecurity community had been holding its breath in anticipation of mass attacks targeting the severe BlueKeep vulnerability in Windows, which Microsoft has patched.

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

The Last Watchdog

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools at their beck and call. Yet the majority feel unsatisfied with narrow daily assignments and increasingly disconnected from the strategic goals of their parent organization.

B2B 152

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Chinese APT Group Targets Mobile Networks: FireEye Mandiant

Data Breach Today

New Malware 'Messagetap' Intercepts Communications for Espionage, Researchers Say The Chinese advanced threat group APT41 is using a new espionage tool to intercept SMS messages from specific phone numbers by infecting mobile telecommunication networks, according to the security firm FireEye Mandiant.

More Trending

ICO: UK Police Should Go Slow on Facial Recognition

Data Breach Today

Commissioner Elizabeth Denham Also Calls for Creating a 'Code of Practice' Elizabeth Denham, the U.K.'s s chief privacy watchdog, is urging police to go slow when it comes to using live facial recognition.

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

WIRED Threat Level

By pointing lasers tuned to a precise frequency at a smart assistant, researchers could force it to unlock cars, open garage doors, and more. Security Security / Cyberattacks and Hacks

IT 95

Italy's UniCredit: Breach Went Undetected for Four Years

Data Breach Today

Incident Exposed Contact Information for 3 Million Italians, Bank Reports UniCredit, an Italian banking and financial services company, sustained a data breach exposing information on 3 million customers that went undetected for four years, the company has acknowledged.

How HR and IT Can Partner to Improve Cybersecurity

Dark Reading

With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Ransomware Gangs' Not-So-Secret Attack Vector: RDP Exploits

Data Breach Today

But RDP Attack Overuse Leads Other Hackers Back to Botnets, Researchers Find Many ransomware-wielding attackers continue to hack into organizations via remote desktop protocol.

Summary – “Retention of Accounting Records:  A Global Survey of Laws and Regulations”

ARMA International

This article summarizes a report published by AIEF on June 3, 2019. Additionally, the article is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November.

Norsk Hydro Breach: Update on Insurance Coverage

Data Breach Today

So Far, Insurance Has Paid $3.6 Million, But More Anticipated So far, Norweigan aluminum company Norsk Hydro has received just $3.6

QSnatch malware already infected thousands of QNAP NAS devices

Security Affairs

Security experts warn of a new piece of malware dubbed QSnatch that already infected thousands of QNAP NAS devices worldwide. A new piece of malware dubbed QSnatch is infecting thousands of NAS devices manufactured by the Taiwanese vendor QNAP.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Eye Clinic Notifies Thousands About 2018 Breach

Data Breach Today

Patient Portal Incident Involved Third-Party Vendor A Utah eye clinic began notifying thousands of patients last week about a 2018 breach involving a third-party portal provider. What should other healthcare organizations learn from this incident

141
141

Addressing the skills shortage in security

OpenText Information Management

Cybersecurity incidents currently represent one of the biggest threats to organizations.

Off the Record: Texting

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes.

How AI is helping to rethink citizen services

OpenText Information Management

Everyone knows what it’s like to deal with a government contact center: listening to recorded messages and being pushed from pillar to post without any resolution.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Homemade TEMPEST Receiver

Schneier on Security

Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest programs and listen to what their own -- and their neighbors' -- electronic devices are doing.

Two unpatched RCE flaws in rConfig software expose servers to hack

Security Affairs

The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched.

New Gartner reports provide essential insight into evolving Content Services landscape

OpenText Information Management

The respected analysts at Gartner have just released their annual assessments of the ECM/content services sector: 2019 Gartner Magic Quadrant for Content Services Platforms 2019 Gartner Critical Capabilities for Content Services Platforms Both are highly recommended reading for everyone involved in content management.

Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files

Security Affairs

Researchers found serious flaws in Investintech’s Able2Extract Professional tool that could be exploited to execute arbitrary code using specially crafted image files.

IT 68

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Assessing the impact of GDPR on traditional data management practices

Information Management Resources

By being aware of the state of regulatory issues, teams can remain innovative with how they use underlying data while still having the processes in place to stay compliant. Data privacy rules Data management

GDPR 64

GitLab plans to ban hires in China and Russia due to espionage concerns

Security Affairs

The popular code hosting platform GitLab is considering to block new hires from China and Russia due to espionage concerns. GitLab is a popular code hosting platform GitLab that is currently used by several major tech companies including IBM, Sony, NASA, Alibaba, Oracle, Invincea, Boeing, and SpaceX.

Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam

Threatpost

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands. Hacks IoT amazon Amazon Alexa apple Siri facebook portal google home laser light attack Security Siri smart home assistant smart voice assistant

IoT 84

Ocala City in Florida lost $742,000 following BEC attack

Security Affairs

Business email compromise scam (BEC) continues to target organizations worldwide, crooks stole $742,000 from Ocala City in Florida.

IT 67

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Time for Another Murder (Possibly) Witnessed by Alexa: eDiscovery Trends

eDiscovery Daily

It’s been a while since we covered a good murder case with Internet of Things (IoT) implications. Here’s a new case in Florida where police have submitted a search warrant to Amazon for recordings from an Echo device in a household where a man was charged with killing his partner with a spear(!).

IoT 58

Everis and Spain’s radio network Cadena SER hit by ransomware

Security Affairs

NTT DATA-owned firm Everis? is one of Spain’s largest managed service providers (MSP), it has suffered a ransomware attack, and it was not the only case.

First Bluekeep Exploit Found in the Wild

Dark Reading

Crashing honeypots alerted the researcher who found the Bluekeep vulnerability