Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Privacy

1/15/2019
01:45 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

7 Privacy Mistakes That Keep Security Pros on Their Toes

When it comes to privacy, it's the little things that can lead to big mishaps.
2 of 8

1. The Accidental Email
Egress Software's Bower points out that many misdirected emails are sent because users type in the first couple of letters of a name and go with what pops up first. While training users to check the To: field twice before hitting 'send' can help, new machine-learning and AI technologies can track patterns of who users typically send emails to and have them double check they are sending them to the right people. For salespeople or reporters in the media who deal with lots of new contacts, the system can flag that this is the first time they are connecting with this person and ask whether they really want to send that attachment.
Image Source: Adobe Stock: nicos

1. The Accidental Email

Egress Software's Bower points out that many misdirected emails are sent because users type in the first couple of letters of a name and go with what pops up first. While training users to check the To: field twice before hitting "send" can help, new machine-learning and AI technologies can track patterns of who users typically send emails to and have them double check they are sending them to the right people. For salespeople or reporters in the media who deal with lots of new contacts, the system can flag that this is the first time they are connecting with this person and ask whether they really want to send that attachment.

Image Source: Adobe Stock: nicos

2 of 8
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
amitashbel
50%
50%
amitashbel,
User Rank: Author
2/12/2019 | 3:48:29 AM
Privacy
Very interesting article. I would say that Privacy has to get much more attention nowadays. The huge growth in how we use data has made privacy a bigger challenge than ever.
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Pledges to Not Pay Ransomware Hit Reality
Robert Lemos, Contributing Writer,  6/21/2019
AWS CISO Talks Risk Reduction, Development, Recruitment
Kelly Sheridan, Staff Editor, Dark Reading,  6/25/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1619
PUBLISHED: 2019-06-27
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session ...
CVE-2019-1620
PUBLISHED: 2019-06-27
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could ex...
CVE-2019-1621
PUBLISHED: 2019-06-27
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker...
CVE-2019-1622
PUBLISHED: 2019-06-27
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to improper access controls for certain URLs on affected DCNM software...
CVE-2019-10133
PUBLISHED: 2019-06-26
A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs.