Handling a Data Breach

Being hit with a data breach is difficult to cope with. Organizations should have a defined set of procedures to follow in case they experience a data breach. Surprisingly, we have not seen any organization have that as a ready reckoner. The human mind always expects bad things to happen only to someone else. So, here is a list of pitfalls to avoid if your organization is the victim of a data breach.
Continue reading “Handling a Data Breach”

Firm Bankrupted by Cyberheist Sues Bank

A California escrow firm that was forced out of business last year after a $1.5 million cyberheist is now suing its former bank to recoup the lost funds.

A state-appointed receiver for the now defunct Huntington Beach, Calif. based Efficient Services Escrow has filed suit against First Foundation Bank, alleging that the bank’s security procedures were not up to snuff, and that it failed to act in good faith when it processed three fraudulent international wire transfers totaling $1,558,439 between December 2012 and February 2013.

Read more.

AccessScanner displays all special permissions of a Windows directory tree

Each user account of a Windows operating system has specific permissions assigned to it. This determines which files can be accessed or modified among other things. Administrators can modify those permissions, to give additional rights to a user or remove rights instead. A simple example is a configuration file that you do not want users to modify in any way or form. You could remove the write permission so that users cannot modify it anymore.

Read more.