Connect with us

Hi, what are you looking for?

Tech & Science

Microsoft data issue sees 250 million records exposed (Includes interview)

Microsoft has announced that a database, used for storing user analytics and contained over 250 million entries, was accidentally exposed last December. What has surprised some analysts is how a major tech vendor such as Microsoft can inadvertently expose such a huge amount of customer data.

Since the incident, Microsoft has enacted auditing of its established network security rules for internal resources. In addition the tech firm has added additional alerting systems, implemented alternative redaction automation and has expanded its scope of detecting security rule misconfigurations.

To understand more about the data breach, Digital Journal caught up with CTO Dr. Vinay Sridhara of Balbix.

Sridhara starts with the key reason for the error – people: “Yet another cybersecurity prophecy has become reality, with Matthew Rathbun, CISO for Azure Government stating, “Ninety percent of my threat landscape starts with a human, either maliciously or inadvertently, making a mistake that somehow compromises security.””

Sridhara also notes how simply spending money on technology is not always the answer: “Despite spending over $1 billion annually on cybersecurity, Microsoft has exposed data on 250 million customers by exposing several databases that had no password protection or encryption, the most basic of security measures. ”

The expert adds that the Microsoft issue is just another example of cyber-risks affecting businesses: “There have been countless exposures of critical data over the past couple of years, all of which follow the same script: customer data gets uploaded to cloud server; well-meaning developer neglects to password protect or encrypt that externally exposed database; and then enters hacker or threat researcher stage.”

In terms of preventive actions, Sridhara recomemnds: “It’s becoming clear that the growing complexity of securing IT assets is an enormous challenge, even for giants like Microsoft. Enterprises must put procedures and systems in place that tighten its configuration process and uses automation wherever possible. Monitoring application and device settings and comparing these to recommended best practices reveals the threat for misconfigured devices located across your network and across all servers.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

US President Joe Biden delivers remarks after signing legislation authorizing aid for Ukraine, Israel and Taiwan at the White House on April 24, 2024...

Business

Meta's growth is due in particular to its sophisticated advertising tools and the success of "Reels" - Copyright AFP SEBASTIEN BOZONJulie JAMMOTFacebook-owner Meta on...

World

Iran's supreme leader Ayatollah Ali Khamenei leads prayers by the coffins of seven Revolutionary Guards killed in an April 1 air strike on the...

World

AfD leaders Alice Weidel and Tino Chrupalla face damaging allegations about an EU parliamentarian's aide accused of spying for China - Copyright AFP Odd...