Security

Your Amazon Account has been Hacked, Or Has It?

Got great feedback after my last skirmish with a phishing attempt so here is today’s attempt: [Greg] Hello, how may I help you? [digitized voice] This is Amazon security calling in regard to a recent $1499 purchase. Our system flagged this purchase because of suspicious elements and we need you to either confirm or contest this purchase. To be fair, I buy a lot [...]

By |2021-02-11T17:23:31-06:00February 11th, 2021|Essay, Security|1 Comment

Hackers Targeting M365 eDiscovery Services

Thanks to my friend Jason Velasco for drawing my attention to the article Hidden Dangers of Microsoft 365’s Power Automate and eDiscovery Tools. Hitesh Sheth at DarkReading.com is extrapolating from a massive data collection study from 4 million Cognito Detect for Office 365 customers by Vectra. I am not sure that I agree with his red flag alert that hackers are actively using Power [...]

By |2021-02-10T10:29:24-06:00February 10th, 2021|Essay, Security, ESI Sources, Architecture|0 Comments

Teams Allows Guests by Default – Hackers Cheer

Because MSFT Admin notices are not posted in a public facing site, I am attaching a PDF of the notice below. Cyber threats and indirect hacking attempts have blossomed in the pandemic remote working age. I brought this change up to cyber security guru John Wilson (HaystackID) on a webinar prep call today. He commented that this could be the equivalent of ‘rolling out [...]

By |2021-01-20T17:16:16-06:00January 20th, 2021|News, Security|0 Comments

Solargate: A Global Trojan Horse in the Supply Train

Good summary and perspective by Doug. First a bit of context and techno translation. The Orion Platform is SolarWinds’ primary systems management bundle for on-premise and hybrid environments. SolarWinds’ products cover the breadth of IT management. That means the hacked version of Orion gave the hackers potential access to servers, applications, databases, storage and more. I have struggled to keep up with the new [...]

By |2020-12-17T11:27:47-06:00December 17th, 2020|Compliance, News, Privacy, Security, Architecture|0 Comments

Label Trade Secrets to Protect Them

The matter and article highlight the increased risk that corporate trade secrets and confidential data may be disclosed by the largely remote corporate workforce. I appreciate the well-structured guidance and concrete action steps proposed. The authors recommendation to perform an IP audit is a good starting point. However, I would add the need for automated categorization solutions that flag and highlight files and communications [...]

Time to Change your Legal Hold Notice Routing

The legal hold notice market is dominated by cloud services that use a wide variety of security methods to send out your notices from their trusted domains. Having implemented a large number of these systems recently, I can tell you how difficult it can be to establish that trust relationship and bypass all the spam/virus/phishing filters to ensure that all custodians receive their hold [...]

By |2020-12-02T13:28:16-06:00December 2nd, 2020|News, Legal Holds, Security|0 Comments

The Civil Discovery Impact of 50,000+ Smart Phone Extractions

Good find by Doug (who credits his wife) on Upturn.org’s new report on the widespread use of Mobile Device Forensic Toolkits like Cellebrite or Access Data by law enforcement. Aside from the civil liberties issues, I want to draw corporate litsupport/compliance/security attention to the logical progression that looms. The latest Gallup poll shows that 58% of employees work remote sometimes or always. I can [...]

Does Your BYOD Policy Cover Device Upgrades and Disposal?

Back in 2014 I wrote a piece on how Avast! pulled personal information from wiped Android phones sold on eBay to demonstrate the dangers of selling off your old smart phone. Now it seems that trading in your iPhone with Apple has not been safe since 2015. The improvements in device encryption may severely limit the potential exposure of corporate email, texts and credentials [...]

Connectors are Key to Unified Data Management

Many years ago as a product manager at Symantec (now Veritas again), I advocated for the acquisition of Globanet because they were a key partner in so many of our compliance-eDiscovery deals. The Veritas Compliance Portfolio covers the core enterprise unstructured data sources (file shares, Office365, Box, Exchange, SharePoint and many more) with a variety of solutions. Their eDiscovery Platform even does remote laptop [...]

Go to Top