Using technology to crack passwords is not a new concept. In fact, if you think back to how Alan Turing cracked Enigma during World War II, as shown in The Imitation Game, the same principles exist today.
Director, Cloud and Infrastructure Solutions, Ricoh Canada
May 6, 2021 10:04:51 AM | Chris Plauschinn
Using technology to crack passwords is not a new concept. In fact, if you think back to how Alan Turing cracked Enigma during World War II, as shown in The Imitation Game, the same principles exist today.
Topics: Security and Privacy
Last week, it was reported that as many as 30,000 governmental and commercial organizations had become compromised in an attack against Microsoft Exchange Server. More recently, this number has doubled to 60,000 known victims globally — many of which appear to be small and medium-sized businesses that depend on the email software. By the time you read this post, it is likely even more organizations will have been affected.
Topics: Cloud Services, Security and Privacy
Jan 28, 2021 2:07:08 PM | Chris Plauschinn
Employees are often considered the weakest link in the security chain. For this reason, many organizations focus their efforts on educating, training and implementing protocols for their own staff when evaluating data privacy plans. While internal threats are certainly a tangible concern, this internal-focused approach fails to recognize another leading cybersecurity threat: vendors.
Topics: Chris Plauschinn, Technology & Managed Services, Security and Privacy
Oct 29, 2020 4:11:55 PM | Chris Plauschinn
Imagine this scenario:
While working from home, you receive a call. The person on the other end says they’re calling from IT. It’s come to their attention that the recent firewall upgrade is blocking employees from accessing the network through the VPN. To resolve the issue, they’re going to have to reset everyone’s user profiles.
Topics: Chris Plauschinn, Security and Privacy
By now, we all know not to click on links from unknown senders, but what about from people we do know? Today I’d like to focus on the concerning surge in ransomware attacks — particularly those triggered by opening email attachments. Whether the sender is well known or even internal from your own organization, there are several reasons why sending files via email should be a practice of the past. In this blog I’ll be sharing a recent case study, why ransomware attacks are on the rise in 2020 and how you can avoid falling victim to these schemes.
Topics: Chris Plauschinn, Security and Privacy
Jul 7, 2020 11:18:20 AM | Chris Plauschinn
WhatsApp, iMessage, Skype, Snapchat and DMs. There’s even a Messenger Kids app for children by Facebook. The list goes on and on when it comes to ways to communicate with your friends, family and work associates.
Topics: Chris Plauschinn, Security and Privacy
When striking a deal with a new partner, companies are (or should be) adamant about reviewing all considerations relating to data collection. Why then, as individuals, do we breeze through the “terms and conditions” agreement when signing up for a new product or service?
Topics: Chris Plauschinn, Security and Privacy
The article EDRM Releases Security Audit Questionnaire with Focus on E-Discovery Security was recently published on Legaltechnews.com by Legaltech News Editor, Zach Warren.
Topics: Chris Plauschinn, Security and Privacy, eDiscovery Solutions
Ricoh eDiscovery provides ISO 9001:2015 quality-certified evidence and document management solutions, as well as litigation support services that successfully integrate technology, defensible processes
© 2021 Ricoh Canada, Inc. All Rights Reserved.