Tue.Oct 22, 2019

Ransomware Hits B2B Payments Firm Billtrust

Krebs on Security

Business-to-business payments provider Billtrust is still recovering from a ransomware attack that began last week. The company said it is in the final stages of bringing all of its systems back online from backups. With more than 550 employees, Lawrence Township, N.J.-based

B2B 130

Unsecure Database Exposed US Military Personnel Data: Report

Data Breach Today

Exposed Database Owned by AutoClerk Hotel Reservation Management System An unsecure database belonging to a company that provides hotel reservation management technology exposed about 179 GB of customer data, including travel arrangements and other data for U.S.

Experts believe the Magecart Group 5 could be linked to the Carbanak APT

Security Affairs

Security experts linked the Magecart group 5 to the infamous Dridex banking Trojan and the Carbanak cybercrime group. Researchers at Malwarebytes found a link between a scheme associated with the Magecart group and Dridex phishing campaigns and the activities of the Carbanak group. .

Veterans' Data at Risk on Shared Network Storage Devices

Data Breach Today

OIG Report Highlights the Risks; Do Others Face Similar Challenges? Inadequately protected shared network storage devices at a Department of Veterans Affairs regional office left veterans' personal and health information vulnerable to ID theft, fraud and other compromises, according to a new report.

Risk 130

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

vpnMentor’s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts Group.

More Trending

A Look at the Partnership Between Hyland and Blue Prism

Document Imaging Report

At CommunityLIVE 2019, Hyland announced a partnership with Blue Prism, a leader in the RPA market. This comes a year after Hyland announced plans to develop its own RPA technology. “We We are excited about the relationship with Blue Prism,” said Hyland CEO Bill Priemer.

NordVPN Says Server Compromised Due to Misconfiguration

Data Breach Today

Security Expert Says Attacker Would Have Had 'God Mode' on VPN Node Virtual private network provider NordVPN says an error by its Finish data center provider allowed an attacker to gain control of a server, but it says its broader service was not hacked.

The Age of Intelligent Robots is Coming

Document Imaging Report

A couple weeks ago, I noticed that when my 13-year old and his friends were insulting each other, they used the term “bots.”

Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Data Breach Today

Draft regulations to carry out the California Consumer Protection Act do not go far enough to clarify ambiguities in the law, which goes into effect Jan. 1, 2020, says privacy attorney Sadia Mirza of the law firm Troutman Sanders, who encourages organizations to submit comments on the proposed regs

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

What is ISO 20614, and why does it matter?

Everteam

The search to ensure the privacy and protection of digital and physical information is an ongoing one. While physical information security has been practiced for centuries, most people view digital information security as a new concern.

SnoPUD connects content to business processes to realize operational excellence

OpenText Information Management

At Enterprise World 2019 in Toronto, we hosted a panel with a few of our customers to discuss their various digital transformation journeys and how they’re supporting their organizational goals by deploying content services technologies.

ECM 52

Automation Anywhere Reveals Next-Gen RPA

Document Imaging Report

It’s no secret that the RPA market has been growing rapidly. According to Harvey Spencer Associates, it grew 200% in 2018 and is expected to grow another 65% this year to reach $1.2 billion.

Doing more with less: A conundrum for creatives

OpenText Information Management

A survey from OpenText™ Hightail™ and Digiday confirmed what creatives in marketing, agencies, and publishing have known for some time: The pressure is on to deliver more content through more review processes – all while having fewer resources to do so.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance

Schneier on Security

Coming out of the Privacy Commissioners' Conference in Albania , Public Voice is launching a petition for an international moratorium on using facial recognition software for mass surveillance. You can sign on as an individual or an organization. I did. You should as well.

IT 52

Security Affairs - Untitled Article

Security Affairs

German company Pilz, one of the world’s biggest producers of automation tools is still down after getting infected by ransomware more than a week ago. German firm Pilz was still down after getting infected by the BitPaymer ransomware more than a week ago, on October 13, 2019.

Are Your Emojis Saying What You Think They Are? A Cautionary Tale From Harrison v. City of Tampa

Hanzo Learning Center

How are you preserving emojis for ediscovery? ediscovery Slack Case Law Summary emoji

52

Epicor Announces Newest Release of Next-Generation DocStar Solution 

Document Imaging Report

Latest DocStar ECM release adds new features to empower digital transformation so organizations can work smarter to reduce costs and invest in growth.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard.

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs

Security Affairs

A vulnerability in the Trend Micro Anti-Threat Toolkit (ATTK) can be exploited by attackers to run malware on targets’ Windows systems.

IT 52

How OPM Cut the Paper Out of the Performance Review Process by Nextgov

IG Guru

So far, the USA Performance app tracks more than 35,000 federal employees—a number expected to more than double in 2020. The post How OPM Cut the Paper Out of the Performance Review Process by Nextgov appeared first on IG GURU.

Paper 52

In Hong Kong, Which Side Is Technology On?

WIRED Threat Level

Yes, authoritarians have co-opted tech. But the story is far from over. Security Security / Privacy

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches

Security Affairs

NordVPN and TorGuard VPN firms were hacked, threat actors leaked the private keys used to secure their web servers and VPN configuration files. .

CCPA In-Depth Series: Draft Attorney General Regulations on Consumer Notice

Data Matters

This post is the first in a three part series taking a deep dive into the five key articles of the Attorney General’s CCPA draft regulations: Article 2 on Notice to Consumers; Article 3 on Business Practices for Handling Consumer Requests; Article 4 on Verification of Requests; Article 5 on Special Rules Regarding Minors; and Article 6 on Non-Discrimination. Today we look at consumer notice.

Sales 60

The DoorDash Data Breach – Third Certainty #7

Adam Levin

In the seventh episode of Third Certainty, Adam Levin explains the dangers of exposed personally identifiable information and shares some tips about how consumers can protect themselves. The post The DoorDash Data Breach – Third Certainty #7 appeared first on Adam Levin. Data Security Video Data breach featured doordash

Capturing Paper Documents - Best Practices and Common Questions

AIIM

What is Capture? Despite technology, most companies continue to struggle to manage the burden of paper in many important business processes. And while there are many technological approaches to digital transformation, the first step is often scanning. Also known as “capture,” this capability is characterized by the ability to scan paper documents to store and use them in digital form instead of paper.

Request for Feedback on the Universal Electronic Records Management Requirements

National Archives Records Express

We released the Universal Electronic Records Management Requirements in August 2017. These requirements marked the first major milestone in the Federal Electronic Records Modernization Initiative (FERMI). These requirements identify high level business needs for managing electronic records and come from existing NARA regulations, policy, and guidance. . We are now in the process of reviewing the requirements and making updates.

FOIA 40

Archivists and Records Managers, part 4

The Schedule

Last week, we looked at a paper presented by Philip C. Brooks at the 1942 Society of American Archivists annual meeting. The third paper presented in that series was by Robert H. Bahmer, who also worked at the National Archives and would go on in the 1960s to be both SAA president and Archivist of the United States. Bahmer’s paper was entitled “ Scheduling the Disposition of Records.”