Newsflash – US Nuclear secrets leaked online through Shadow IT

by | Jun 16, 2021 | Security

This sounds like a nightmare that could never happen.

US soldiers have been putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’ .

It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn.  It seems these are common learning tools used in universities to help students memorise facts.  That works well so long as the facts aren’t top secret!  Even worse, their settings were on ‘public’ not ‘private’!

It is a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our KARE FOUNDATION proactive cyber-security plan helps identify use of these sites in your organisation.

For more detail : Why you need to know all the cloud services that your organisation uses – part 2 – (US DoD Nuclear Secrets!) – IT Solutions and Managed Services (kinetics.co.nz)

Shadow IT is part of our 10-point cyber-security check list

While there is no single layer of technology that can guarantee you will be safe from hackers, you can reduce your risk by adding layers of protection. How many of our 10-point check list are in place for you?

Keeping our Security tools up to speed

Keeping our Security tools up to speed

Cyber-crime is estimated to earn criminals US$7 Trillion a year That sort of money buys cyber criminals a lot of resources.  It’s no surprise then that cybercrime has its own support industries. You don’t need to access the "Darknet" to purchase hacker tools.  Many...

How does a ransomware attack start?

How does a ransomware attack start?

When you read about the ransomware attacks, such as those on Honda, Garmin, Toll, Fisher and Paykel and Lion, it’s easy to think these attacks only target large enterprises. Unfortunately, that would be a mistaken view. The reality is that all businesses are under...

International eSecurity Compliance

International eSecurity Compliance

It feels it's like a daily occurrence for one of our clients to be asking for assistance with a security compliance questionnaire from their client. Most of these are being driven by corporates with international footprints. This becomes complex as each jurisdiction...

Is “Deathstalker” coming for you?

Is “Deathstalker” coming for you?

Cyber-Crime is big business.  The criminals are organised and sophisticated.  Imagine if they put their ingenuity to things that are good?  But alas, that's not reality.  Instead we have to brace ourselves to deal with another wave of crime. Deathstalker is a such a...

Privacy Act 2020 – Are you ready for Dec 1st?

Privacy Act 2020 – Are you ready for Dec 1st?

Parliament recently passed the new Privacy Act, which comes into effect on 1 December 2020. This introduces stricter measures around the storing, sharing and breach of personal information and gives the Privacy Commissioner more powers. Every organisation should have...