Skip to main content

Data security – week 2

Microsoft Data Breach

Microsoft is one of the most popular companies that everyone uses day to day, but did you know Microsoft had a data breach in July 2021. That Microsoft PowerApps data breach exposed 38 million records containing personal identifiable information PII. The data breach caused 47 major companies across multiple industries including the government and the public health agencies to be impacted and this data breach. The breach exposed personal identifiable information that includes names, COVID-19 contact tracking information, vaccination appointments, Social Security numbers call mom employee IDs and email address. Analysts discovered the open data protocol API for an organisation’s that power apps portable that contain  an anonymously accessible list lists of data.





Microsoft Power Apps is a cloud-hosted suite of services that allows organizations to create business intelligence applications. Power Apps portals allow both internal and external users to securely access data through a public website. Users can store data, create forms for users to enter data, and use APIs to retrieve data from other applications.

The service also allows users to enable OData APIs, which permit organizations to publicly display Power Apps lists. A design mishap left organizations that did not enable certain permissions vulnerable.

If this would happen again the credibility of Microsoft reputation would be at stake. Microsoft is normally a trustworthy company with hundreds of millions of people using their products on a daily basis. for this not to happen again I think the company will need to look at their design and have more beta testing before they launch it to the market. just so they can be sure that their customers day arts are as protected as possible.

Comments

Popular posts from this blog

 Data security week 5 blog   Intrusion Detection Systems What is Intrusion Detection Systems? Intrusion Detection Systems or in short form IDS. Am going to refer to Intrusion Detection Systems as IDS. IDS is a network security tool that is used to for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies. IDS monitors network traffic for unusual or suspicious activity and sends an alert to the administrator user. Detection of anomalous activity and reporting it to the network administrator is one of the main functions however, some IDS software can take action based on rules when malicious activity is detected, like blocking certain untrustworthy incoming traffic. IDS can be host based or network-based systems.   How can IDS protect your ne...
  Password policies and importance of data Encryption. what is a password? A password is a secret word or phrase that must be used to gain admission to a place. A Password is a word, phrase, or string of characters intended to differentiate an authorized user or process for the purpose of permitting access, from an unauthorized user or put another way a password is used to prove one's identity or authorize access to a resource.   Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services. An ideal password must satisfy two conflicting aims. It should be: ·         memorable enough that the user can recall it without writing it down ·         long enough and unique ...

Jesse Lingard home workouts!!!

Manchester United star Jesse Lingard is posting on his social media free work out you can do at home. Manchester United midfielder Jesse Lingard’s 40-minute workout consists of three rounds of four sets of exercises, including cardio, core and overall strength, with a bonus round if you can hack it! His work as follows --  First set no breaks in between  High knees --30 Seconds Bur-pees --30 seconds Mountain climb -- 30 seconds Alternate lunges -- 30 seconds  1 minute rest Second set no breaks in between Sit ups -- x10 Elbows to knees -- x10 Touch heels -- x10 Scissors -- x10 Touch toes -- x10  1 minute rest Third sets no breaks in between   Press up -- 8 to 1 Press up to plank -- x10 Plank left / right -- 30 seconds  1 minute rest Forth sets no breaks in between  Wall sit / squat -- 30 seconds  Revers Lungs -- x10 Jump squats -- x10  Walk on...