Red network information security, data security is the trend

You are not always receive some telemarketing calls? Although that information was leaked very annoying, but in addition to Tucao a few, we can only put up with. Obviously their usual cautious, you do not know how the information was leaked, perhaps because renting a particular time in the agency where stay on the phone? Or maybe someone got their information through hacking? "The Internet age, everyone is naked", meaning to speak with a bit of ridicule, now a prophecy. In this article, we will see some cases of catastrophic leaks and attacks in early 2019, and to learn from it.

  

Victorian Government 30,000 employees leakage of personal information

ABC January reported that an unknown party download section after the Victorian Government Directory, there are 30,000 civil servants Victoria stolen information, including e-mail, job title and job number, etc., fortunately the bank staff and financial information is not leaked. Prime Minister's office said the leak has been handed over to the police, the Office of the Australian Network Security Center and Victoria Information Commissioner to investigate.

 

Russia more than 50 large enterprises were unknown attacker extortion

March 2, Rostelecom-Solar's network security experts recorded a massive cyber attacks against Russian companies. The attack was the use of networking equipment, especially routers, sending phishing e-mail to more than 50 well-known companies, disguised as Oshan, Magnett, Slavoniov like blackmail company personnel. Tracking equipment is much more difficult than the black network server, an attacker using things device to an invader simpler, more secure. Any device capable of sending e-mail, such as modems, routers, network storage, smart home ecosystem and other gadgets, can be used for phishing attacks.

 

Intel CPU reproduction of high-risk vulnerabilities officially certified disclosure of confidential data

Worcester Polytechnic Institute researchers have discovered another named Intel processors in high-risk vulnerabilities Spoiler's. And Spectre previously identified as, Spoiler leaked the user's private data. Although Spoiler forecast also depends on the implementation of technology, but existing solutions to prevent vulnerabilities Spoiler powerless.

 

CD-speed data transmission cloud security escort

Before danger, prevention is the best solution, as a leading cloud storage transport lightweight application platform, CD-speed cloud pass suggest we pay attention to data privacy, choose a safe, stable, easy to store large file transfers tools allow criminals no exploits.

 

CD-speed transmission from a technical point cloud data security:

TLS encryption algorithm: the level of financial strength of the encryption AES-256, to protect user data privacy.

FTPS FTP protocol and encryption technique to increase the data channel SSL security features.

Firewall friendly: CD-speed communication protocol completed just open a UDP port, the firewall is more secure than open a large number of network ports.

Encryption certificate configuration: Configuration Support confidential certificate, the service access more secure.

 

CD-speed transmission cloud data security from a management level:

To avoid contact with the user data, the user will be stored in the password data based on AES-256 + random salt high strength encryption algorithm, even if the developer can not recover the password stored in the source ciphertext. CD-speed transmission is also equipped with a cloud very strong team and operation and maintenance management processes, we have set up a set of internal work processes and norms of operation and maintenance service standards, to ensure that does not touch the user data.

 

Protect data privacy and security, not only in relation to individuals, but also about the survival of the enterprise, and even national security, safeguard of the trumpet, are you ready?

 

Guess you like

Origin www.cnblogs.com/raysync0704/p/11580128.html