People are the weakest link
This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’
It is alleged that US Soldiers were saving sensitive information on a couple of common flashcard sites, presumably of things they were trying to memorise and learn. Even worse, their settings were on ‘public’ not ‘private’
It’s a classic warning about the risk of people, however well intentioned, saving critical data online in places the organisation is unaware of, and can’t control. That’s why our new KARE for Security S2 plan helps identify use of these sites in your organisation.
US Soldiers Accidentally Leaked Nuclear Weapons Secrets: Report (gizmodo.com)
Shadow IT
Shadow IT is one of the largest threats to data privacy in organisations today.
It’s not necessarily because these sites are going to be hacked, although that’s always possible, but just because if you don’t know the tools are in use, then there is no way that you can manage them!
The first step to maintaining this data is to identify it! That’s why you need new tools that are cloud focused. If you’re still using the same old security tools that you used to use prior to the cloud, then you are not keeping up and we need to talk!
Microsoft Office competency testing
[header2 text=" How do you know your staff skill level with Microsoft Office? " align="left" color="#336A40" margintop=""] Measuring the productivity of chickens is easy … you just count the eggs. Measuring productivity of those using Microsoft Office is much...
Reduce email clutter…
[header2 text=" Reduce email clutter and improve communication with Microsoft Teams" align="left" color="#336A40" margintop=""] Microsoft have introduced ‘Teams’ into Office365. It is a new application that’s included in most commercial Office365 plans. The concept...
Password expiry SOLVED
[header2 text="Ensure password expiry notifications get actioned" align="left" color="#336A40" margintop=""] These days it seems everyone has multiple devices. Desktops, tablet’s, smart phones, iPad and Surfaces. With more choices of what we work on, we have more...
Kinetics are Triple Finalists in the 2017 Microsoft Partner Awards
[header2 text="Punching above our weight" align="left" color="#336A40" margintop=""] Kinetics Group is proud to be selected as a finalist in three categories for the Microsoft 2017 Partner Awards - 'Small & Midmarket Cloud Solutions', 'Cloud Productivity' and...
Jacobsen
"Kinetics brought a large pool of knowledge across a broad range of companies and markets that assisted us to reduce the time to market of solutions and infrastructure implementations." - Truby Gravatt, IT Manager IT Review Identifying gaps vs best...
This week’s social engineering hack
The latest attempt to trick you into opening an infected document. Includes swearing and then a new enticing warning message. Today I received this message (I have edited out the swear word.) yea , we finally did it. here is the bank confirmation:...
Office365 Updates
There's nothing like seeing the computer display hall at MOTAT to be reminded of how much things change and how quickly. One of the sayings I heard late last year was that never in history has business has never changed faster than now, and yet it will never change...
Cloud could be a waste of time…
[header2 text="Unless cloud changes how you operate, you are missing the point" align="left" color="#336A40" margintop=""] Is the Cloud helping you drive your bottom line - Are you doing the same stuff the same way or using the cloud to do new things better? The cloud...
Cryptostopper!?
[header2 text="CryptoStopper!?" align="left" color="#336A40" margintop=""] That’s right, a CryptoLocker Stopper. [header2 text="Is there really such a thing?" align="left" color="#336A40" margintop=""] It appears so, at least for some forms of the beast. This amazing...
Update : Spearphishing is now much more aggressive
By now, most of our followers will know what spearphishing is - we've posted before about it [header2 text="Spearphishing just stepped up a notch and no one is immune." align="left" color="#336A40" margintop=""] Most of our client's have now experienced an attack, but...