article thumbnail

Digitizing Records: Understanding Metadata Requirements

National Archives Records Express

For example, while an agency might use the label Publication Name instead of the label Title, the information captured would be the same, for example: “Monthly Status Report, June 30, 2013”. Creating Unique File Names and Record IDs Unique file names and record IDs must be created for each image file.

Metadata 109
article thumbnail

Tips for Folder Structure Design and Cleanup

The Texas Record

Consistency Choose file naming conventions and stick with them. For example, unless an abbreviation is known and widely used, avoid using it in folder or file names. A consistent approach with folder structure and file naming means there is less need for individual interpretation. Be consistent.

Cleanup 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evil Corp rebrands their ransomware, this time is the Macaw Locker

Security Affairs

The Macaw Locker ransomware encrypts victims’ files and append the .macaw macaw extension to the file name of the encrypted files. An example of real-world consequences from the ransoming of Sinclair Broadcasting Group. The group behind the attack is Evil Corp.

article thumbnail

B0r0nt0K ransomware demands $75,000 ransom to the victims

Security Affairs

The ransom encrypts all files and renames them by appending. rontok extension to the file names. “The file’s name will also be renamed by encrypting the filename, base64 encoding it, url encoding it, and finally appending the.rontok extension to the new file name.

article thumbnail

Microsoft warns of Dexphot miner, an interesting polymorphic threat

Security Affairs

Layers of obfuscation, encryption, and the use of randomized file names hid the installation process. Polymorphic techniques involve frequently changing identifiable characteristics like file names and types, encryption keys and other artifacts. ”reads the analysis published by Microsoft.

article thumbnail

Threat actors leverage Microsoft Teams to spread malware

Security Affairs

Once an attacker obtained Microsoft 365 credentials, for example from a previous phishing campaign or data breach, that can access Teams and other Office applications. “Compounding this problem is the fact that default Teams protections are lacking, as scanning for malicious links and files is limited. .

article thumbnail

Guest Post - How important is digital document consistency?

AIIM

Finally, automated scan workflows can define the document destination for example, a third party repository, an on-premise shared folder or line of business application. Consistent document capture and file naming. Another area that lends itself to mixed results is in file naming structure.