Wed.Nov 06, 2019

The Malicious Macros Problem May Be Solved Soon

Data Breach Today

Using Containers, Malicious Documents Will Be Isolated in Office 365 A handful of common lures still have astounding success in compromising computers: phishing emails, malicious links and the king of them all: the malicious Microsoft Office document.

NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

The Last Watchdog

From the start, two-factor authentication, or 2FA , established itself as a simple, effective way to verify identities with more certainty. Related: A primer on IoT security risks The big hitch with 2FA, and what it evolved into – multi-factor authentication, or MFA – has always been balancing user convenience and security.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IT Misconfiguration Leads to 15 Breach Reports

Data Breach Today

Letters From Texas Health Resources Hospitals Mailed to Wrong Recipients A misconfigured billing system that caused a mailing mishap affecting nearly 83,000 individuals has prompted Texas Health Resources to file 15 breach reports to federal regulators - one for each hospital involved

IT 151

The Growing Presence (and Security Risks) of IoT

Thales eSecurity

As most of us know, IoT devices are on the rise in enterprise networks. According to McKinsey & Company , the proportion of organizations that use IoT products has grown from 13 percent in 2014 to 25 percent today.

IoT 126

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

'Soviet Tactics': Russia Tries Prisoner Swap for Hacker

Data Breach Today

Moscow Reportedly Seeks Leverage as Counter-Extradition Attempts Keep Failing What's the best way to spring your citizens from foreign jail if they've been detained on U.S. hacking charges?


More Trending

Alleged Capital One Hacker Released From Prison

Data Breach Today

Paige Thomson Will Stay in Halfway House Until Her 2020 Trial Alleged Capital One hacker Paige A. Thompson has been released from prison and will stay in a halfway house until her trial in federal court next year.


Germany: Berlin data protection authority imposes EUR 14.5 million fine for “data cemetery”

DLA Piper Privacy Matters

On 30 October 2019, the Berlin Commissioner for Data Protection and Freedom of Information ( Berliner Beauftragte für Datenschutz und Informationsfreiheit – “ Berlin DPA ”) imposed an administrative fine of about EUR 14.5

GDPR 101

Getting Ready for the NIST Privacy Framework

Data Breach Today

By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights

Metadata Management, Data Governance and Automation


Can the 80/20 Rule Be Reversed? erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Twitter Insiders Allegedly Spied for Saudi Arabia

WIRED Threat Level

Hackers are one thing. But too few companies take the threat of an inside job seriously enough. . Security Security / Cyberattacks and Hacks

A flaw in the Libarchive library impacts major Linux distros

Security Affairs

Google experts found a flaw, tracked as CVE-2019-18408, in the compression library libarchive could lead to arbitrary code execution. Google experts found a vulnerability, tracked as CVE-2019-18408, in the compression library libarchive could be exploited to execute arbitrary code. .

Scammers Are Exploiting a Firefox Bug to Freeze Your Browser

WIRED Threat Level

Fraudulent tech-support sites are causing the browser to lock up and display a disturbing message. Force quitting is the only way out. Security Security / Cyberattacks and Hacks

Details of an Airbnb Fraud

Schneier on Security

This is a fascinating article about a bait-and-switch Airbnb fraud. The article focuses on one particular group of scammers and how they operate, using the fact that Airbnb as a company doesn't do much to combat fraud on its platform.

IT 78

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Pixel 1, RIP: Google Ends Support After Just Three Years

WIRED Threat Level

The original Google Pixel didn't make the cut for this month's Android security patches. . Security Security / Security News

California DMV Leak Spills Data from Thousands of Drivers

Dark Reading

Federal agencies reportedly had improper access to Social Security data belonging to 3,200 license holders

University of Rochester Medical Center hit with $3M fine for breaches

Information Management Resources

The University of Rochester Medical Center has been hit with a $3 million settlement fine and a two-year corrective action plan for two technology-related breaches. HIPAA regulations Data breaches

Social Media: Corporate Cyber Espionage's Channel of Choice

Dark Reading

Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage

Risk 73

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Brooklyn Hospital lost patient records after a ransomware infection

Security Affairs

Another organization in the healthcare industry was a victim of a Ransomware attack, this time the victim is Brooklyn Hospital. A ransomware attack has infected several computer systems at the Brooklyn Hospital Center in New York, the organization permanently lost patient data.

Accounting Scams Continue to Bilk Businesses

Dark Reading

Yes, ransomware is plaguing businesses and government organizations, but impersonators inserting themselves into financial workflows - most often via e-mail - continue to enable big paydays

‘Camgirl’ sites expose millions of members and users

Security Affairs

Hackers compromised a network of ‘ camgirl ’ sites and exposed data belonging to millions of users and sex workers. Hackers compromised several ‘ camgirl ‘ sites and have exposed millions of sex workers and users.

The Uphill Battle of Triaging Alerts

Dark Reading

Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Facebook discloses a new leak that exposes group members’ data

Security Affairs

Facebook disclosed a new security incident, the social network giant admitted that app developers may have accessed its group users’ data. Facebook disclosed another security incident, the company revealed that roughly 100 app developers may have improperly accessed users’ data in certain Facebook groups. Let’s understand how it is possible.

AIEF Research Deadline Extended until Nov 30

IG Guru

CALL FOR RESEARCHERS – TOPIC: THIRD PARTY INFORMATION MANAGEMENT CONSIDERATIONS. The post AIEF Research Deadline Extended until Nov 30 appeared first on IG GURU. AIEF Business IG News Information Governance Record Retention Records Management Sponsored Standards Storage Research

Desjardins Data Breach Worse Than Originally Reported

Adam Levin

The June data breach of Canadian financial institution Desjardins was wider in scope than initially reported and compromised the data of all 4.2 million of its individual members.

Facebook Privacy Breach: 100 Developers Improperly Accessed Data


Facebook said that 100+ third-party app developers had access to restricted data for members of Groups, in its latest privacy snafu.

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

A Warning About Viruses From Weird Al

Dark Reading

Should you get an e-mail with the subject 'stinky cheese


Great Scott! A True Story Illustrating the Importance of Ethics in Privacy and Records Management

Information Governance Perspectives

Truth is stranger than fiction… There’s a memorable scene in Back to the Future 3 where Marty receives a Western Union telegraph from Doc almost a century after it was originally mailed, warning him of events to come.

BMO off to promising start on its artificial intelligence projects

Information Management Resources

The firm's data science team has already built three customer-facing AI tools this year, which it hopes to keep building upon. Artificial intelligence Data strategy Machine learning