When security software firm Trend Micro calls for Windows PC users to uninstall Apple’s Quicktime video software, it’s time to listen up.
What is QuickTime? It’s Apple’s cross-platform software that runs video, sound, animation, graphics, text and music. QuickTime can be used to play content on Mac OS and Windows computers. In this case, the advice to remove Quicktime from computers only applies to QuickTime on Windows computers.
Why the rush? Why delete QuickTime on Windows?
TrendMicro cites two reasons for their urgent call to action:
- Apple is ending its support for QuickTime on Windows. The company will no longer be delivering security updates for the Windows version of the product
- TrendMicro has discovered two new security vulnerabilities in QuickTime on Windows
These ‘gaps’ in security could be exploited by hackers, enabling them to take control of a user’s computer.
Mossak Fonseca “has now become a poster child for the shortcomings of widely relied upon security solutions,” wrote Seclore chief executive Vishal Gupta, in an email to SCMagazine.com. “Unless data-centric security solutions capable of persistently controlling use of documents are in place, there is very little likelihood Mossak Fonseca, or any data breach victim, can remediate the damage done from this incident.”
The Panama Papers leak is the largest data hack and information leak in history.
According to Wikipedia, the leak has resulted in the release of 11.5 million confidential documents. These files provide detailed information about legal and financial dealings of more than 214,000 offshore companies listed by Mossack Fonseca, a Panamanian law firm and corporate service provider. The scale of the breach and the contents of the secret documents has implicated high profile individuals and corporations in the use of complex company structures to avoid taxes, launder money and circumvent financial sanctions.
On 6 April 2016 Ramon Fonseca, a partner at Mossak Fonseca, stated that the leak was not the outcome of an ‘internal job’ but was the result of a hack traced to servers located abroad.
In late March/ early April the company reportedly sent an email to its clients saying the security of its files had been compromised after “an unauthorised breach of our email server”.
Your staff are on the front line when it comes to protecting your business’ data. But, how well prepared and resourced are they to act as your cybersecurity guards?
Cybersecurity threats come in many shapes and your business can be exposed through various ‘threat vectors’. Often your staff are among your most vulnerable breach points. These risks are exacerbated when they don’t have the tools they need to do their jobs.