article thumbnail

#World Password Day: Protecting corporate social media passwords

IT Security Guru

However, social media passwords pose unique security issues that companies are sometimes ill-prepared to address. Whether due to an internal policy or if social media is outsourced to a third party agency, this lack of password security could be putting organisations and their reputations at risk.

article thumbnail

What Damage Can Happen If Data Leaks When Quantum Computing Breaks Today’s Encryption

Joseph Steinberg

At some point in the not-so-distant future, quantum computers are going to pose a major threat to today’s encryption mechanisms and encrypted data. To begin with, all of today’s encrypted communications could potentially be at risk of being leaked and abused.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: A call to decentralize social identities — to curtail social media privacy abuses

The Last Watchdog

Social media giants have long held too much power over our digital identities. By making people feel like mere products- this exploitative digital environment further encourages a bubble of distrust amongst social media users. The fine was the largest ever imposed on a social media company for privacy violations.

Media 245
article thumbnail

Securing Your Organization's Digital Media Assets

SecureWorld News

Business media assets have become exceptionally valuable intellectual property for brands in recent years. Data breaches that compromise proprietary media content can be financially frustrating at best, and completely shatter an organization's reputation at worst. What are digital media assets?

Media 80
article thumbnail

Cyber Attack on American Streaming Media Plex

CyberSecurity Insiders

Plex, an American Streaming platform, has officially sent out email notifications to all its users urging them to change their passwords. In the statement issued by Plex, the streaming media specified that the activity was discovered by it on August 23rd of this year and soon its IT staff, along with a third-party security firm, investigated.

Media 128
article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

Encryption uses mathematical algorithms to transform and encode data so that only authorized parties can access it. What Encryption Is and How It Relates to Cryptology The science of cryptography studies codes, how to create them, and how to solve them. How Does Encryption Process Data? How Does Encryption Process Data?

article thumbnail

Best Encryption Software for 2022

eSecurity Planet

It’s been a couple of decades since data tapes delivered by trucks made encryption a standard enterprise cybersecurity practice. Yet even as technology has changed, sending and receiving data remains a major vulnerability, ensuring encryption’s place as a foundational security practice. What is Encryption?