Information Security Advisory - Office Security: Three Hidden Risks

This notice is archived content and this information may no longer be accurate.
Some office security risks, such as sensitive documents left unattended, are obvious. But many workers fail to think about other risky behavior that could cause a breach. Here are a few danger zones you may not have considered:
1. The copier/printer. Just as today’s cellphones have more computing power than PCs from a few years ago, modern copiers and printers are typically powerful networked devices. But the biggest risk in the shared office copier is decidedly low-tech: how many times have you gone to make a copy and found that somebody left a document there? Have you ever committed this gaffe yourself?
2. Word document revision tracking. Microsoft’s word processing software includes a powerful revision tracking (or Track Changes) feature that comes in handy when multiple authors collaborate on a document. But there’s a massive risk that has tripped up more than a few large businesses: It’s easy to release the final version of a document for public consumption without clearing out all those revision notes, which may include highly sensitive (or embarrassing!) data.
3. Cellphone and tablet spying. Mobile devices are so common in today’s business world as to be nearly invisible, but keep this in mind: when you’re in a meeting you believe to be private and confidential, it’s easy for any attendee to record audio using a tablet computer or a pocketed phone. In fact, it’s no great challenge to broadcast the meeting in real time! This trick has been used in recent years by both disgruntled employees seeking to cause trouble, and by corporate spies looking for a competitive advantage.

85% of Companies Plagued by Malware
Nearly 85% of businesses are harboring malware, and a new “bot” (that is, remote-control software used to spy, send spam, and commit other crimes) emerges each day, according to new research. Almost three-quarters of all organizations have at least one bot infection, and every three minutes a bot communicates with the computer server that controls it. The same study found that the number of organizations infected with bots jumped from 63% in 2012 to 73% last year. An enterprise computer is infected with bot malware every 24 hours, according to the report. Security experts called the findings “harrowing.”

Navy Nuclear Carrier Sysadmin Hacked Databases
A former U.S. Navy system administrator is part of a group that's been charged with hacking into 30 different sites and stealing sensitive information, while working in the nuclear reactor department aboard the USS Harry S. Truman aircraft carrier. An Oklahoma indictment charged alleged members of "Team Digi7al" with hacking and stealing sensitive information from sites run by the likes of the Department of Homeland Security, Los Alamos National Laboratory, Harvard University, and the Toronto Police Department. The 27-year-old sailor cited boredom as one of the reasons he engaged in the hacking campaign.

What’s in Your Wallet? Fewer Americans Carrying Cash

A new study finds that nearly 10 percent of Americans don't carry any cash on them on a daily basis. The same study found that about 80% also carry less than $50 and about half of all Americans carry $20 or less. The Bankrate study found that the results were fairly even across age groups, income levels and education. The report also found that men were more likely than women to carry cash. The results signal a substantial decline in the reliance on cash for transactions. To keep non-cash transactions secure, experts recommend using credit cards versus a debit card. Credit cards offer consumers greater protection in the event of fraud. When making a debit transaction, opt to use a signature instead of a pin number.