Remove Database Remove Encryption Remove Research
article thumbnail

Advanced Data Security: Safeguarding Your Business In The Digital Age  

VISTA InfoSec

From customer information and financial records to trade secrets and proprietary research, these digital assets are invaluable. Implement a solid backup strategy to renew your operations after disruptive incidents like ransomware encryptions, hardware failures, or accidental deletions.

article thumbnail

Unencrypted Vistaprint Database Exposed Personal Customer Data

PYMNTS

Printing company Vistaprint left an online database containing customer interactions unencrypted, according to a report. A security researcher named Oliver Hough discovered the unprotected database on Nov. After the report was published, the company quietly took down the database.

article thumbnail

American Express India Database Accessible To Anyone In October

PYMNTS

American Express India enabled a database to be accessible to anyone for longer than five days in October, according to a report in The Next Web. According to the report , the Hacken cyber consultancy team’s director of cyber risk research, Bob Diachenko, discovered the unprotected database on Oct.

article thumbnail

Data Breaches 101: What They Are And How To Prevent Them

VISTA InfoSec

Business Intelligence Email inboxes, including attachments/metadata, contracts, strategic plans, product designs/code, proprietary research, trade secrets, intellectual property like patents, and confidential memos/documents. How Breaches Impact You Suffering a breach carries severe consequences beyond just data loss.

article thumbnail

JCrush’s Open Database Exposes 200K User Records

PYMNTS

The app, designed for the Jewish community, left the database open without a password, exposing user data and private messages, said security researchers Noam Rotem and Ran Locar, according to reports. In addition, none of the data was encrypted. Dating app JCrush potentially exposed the records of around 200,000 users.

article thumbnail

PCI DSS Requirement 2 – Changes from v3.2.1 to v4.0 Explained

VISTA InfoSec

For instance, web servers, database servers, and DNS should each be implemented on their own separate servers. This includes, but is not limited to, default wireless encryption keys, passwords, and SNMP community strings. Requirement and Testing Procedures 2.2.1 a Choose a sample of system components. in PCI DSS.

PCI DSS 289
article thumbnail

TrueDialog SMS Provider Leaks Millions Of Business Texts

PYMNTS

An exposed database run by TrueDialog revealed millions of SMS text messages, according to published reports on Sunday (Dec. The exposed database, which contained years of sent and received text messages, wasn’t password protected or encrypted. Vistaprint spokesman Robert Crosland said customers in the U.S.,