Imagine trusting a tech company to handle your data securely, only to find out they’ve left sensitive files wide open for anyone to access. That’s exactly what happened with Ahmedabad-based AI startup WotNot, known for helping businesses create custom chatbots. Due to a misconfigured cloud storage bucket, nearly 350,000 sensitive files were left exposed online,… Read more »
Uncategorized
Microsoft Cracks Down on Unsupported Hardware with Windows 11 Watermarks
Using Windows 11 on an older, unsupported PC? Get ready for some unwelcome surprises. Microsoft is stepping up its game with desktop watermarks and nagging notifications aimed at users who’ve sidestepped the operating system’s strict hardware rules. These changes are part of their push to enforce compliance around the workarounds with unsupported PCs. Here’s what… Read more »
Retail Shopping Risks: SelectBlinds Cyberattack Exposes Data of Over 200,000 Customers
The holiday season may bring cheer and excitement, but for cybercriminals, it’s the ultimate shopping spree. As retail moves increasingly online, especially during the holidays, hackers exploit surges in online transactions to breach retail websites and payment systems, targeting everyone from major brands to small businesses. A recent high-profile breach involving the popular online retailer… Read more »
CrowdStrike Software Causes Widespread Disruptions
Airlines, hospitals, retailers, and other businesses were rocked by delays and cancellations due to an unprecedented error with software from the cybersecurity firm CrowdStrike. The outage impacted thousands of Windows PCs, wreaking havoc on the internet infrastructure of many organizations. Unfortunately, this includes essential services like hospitals and 911 call centers. The mass impact of… Read more »
Major Email Security Risks in 2024
Email remains king as the primary form of communication in the modern workforce. However, its extensive use also makes it a prime target for cyber threats. According to a recent report by Cofense, a staggering 90% of data breaches stem from phishing attacks, establishing it as the leading vector for cybercrime in 2024. Who is… Read more »
Security Concerns with LastPass
In general, it’s a good thing to be using a password manager to generate a strong, unique password and to keep track of all of your passwords. For many of OptfinITy’s clients, the password manager that has been used has been LastPass – something we ourselves have been using since 2013. Over the past 6… Read more »
How Changes to the Microsoft Donation Program will Affect You
If you’re like many non-profits, you may benefit from the Microsoft Non-profit program. This endeavor has enabled nearly 400,000 organizations worldwide to access top-notch technology at discounted rates. However, there are going to be some major changes to the software donation program that will take place on April 4, 2022 that you should be aware… Read more »
What are the Cybersecurity Threats Facing the 2022 Winter Olympics?
Cybersecurity apprehensions surrounding the Olympics have been prevalent for the past few Olympic games, but the 2022 Beijing Winter Olympics have brought on a new set of concerns as it relates to technology. In 2020, the Tokyo Olympics incurred over 450 million cyber-related incidents, far superseding the number seen during the 2012 London Summer Olympics…. Read more »
Healthcare’s Struggle with Cybersecurity
The healthcare industry has become more important than ever during the coronavirus pandemic, as the majority of Americans have had to interact with a provider in order to get a coronavirus vaccine, test, or care. This has resulted in an influx of personal medical information to these institutions. That coincided with a global increase in… Read more »
What is V2X Technology?
Self-driving cars have become an iconic part of the early 21st century. Tech companies like Uber, Google, and Apple have all made forays into self-driving vehicles to media fanfare. Self-driving car company Tesla has a legion of devoted fans, partially due to CEO Elon Musk’s purposeful cultivation of that base, and the stock price to… Read more »