Welcome to this edition of SecureNews. Attention all organizations with Mac users: we now also support OS X, Yosemite, so there is no reason not to encrypt your Mac devices as well! The standard installation also includes Media Encryption and a Firewall. More details in Product News below.
Also, in Industry News this month, the latest reported cyber-attacks focus on the U.S. government and I.R.S.. Hackers are using data stolen from other breaches to gain access to information such as personal tax returns, potentially impacting thousands of individuals. Find out more below.
And don’t forget that you can strengthen your own data protection by upgrading to Total Endpoint Security. Contact us for details ...
Alertsec Endpoint Encrypt now supports OS X Yosemite (version 10.10), the latest version of Mac operating system.
Our own in-house tests show that the initial encryption of the hard drive is super fast. We encrypted a 256 GB hard drive in just over 1 hour. Even though the encryption process is done in the background and the user can work on the computer as normal while it’s going on, it’s nice to be able to get it done quickly.
Support for OS X Yosemite is available in two versions of our Endpoint Encrypt service:
Basic Comply: Includes FDE, Media Encryption, Compliance and Firewall
FDE: Includes Full Disk Encryption only
Don’t forget that you need to decrypt your hard drive before you can upgrade the operating system to Yosemite. If you have any questions about how to do this, we’re here to help.
All existing customers using Alertsec Xpress or Endpoint Encrypt have the possibility to upgrade to Total Endpoint Security. By upgrading your service you will also get anti-malware, program control and firewall protection at very low cost.
Contact your partner or Alertsec to get more information about how to upgrade from your existing service.
Breach impacts millions of U.S. workers
At least four million current and former U.S. government workers have been affected in one of the largest breaches of federal employees’ data. The intrusion apparently originated in China, according to officials.
The compromised data was held by the Office of Personnel Management, with the target appearing to be social security numbers and other “personal identifying information”.
The breach is the third such intrusion in the past year and came before the personnel office had completed new security procedures to restrict remote access for administrators.
Criminals used stolen data to gain access to past tax returns of more than 100,000 people and claim $50 million in fraudulent refunds, according to the Internal Revenue Service. The agency said the attackers exploited email addresses, passwords and other data gleaned from other breaches to answer basic authentication questions about subjects like birth dates or the names of family members.
After recent breaches eg. at the health insurer Anthem, security experts note that users’ personal information is now widely available to hackers.