ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Dealing with Major Data Leak

Microsoft Dealing with Major Data Leak

Incorrect configurations on your infrastructure’s hardware are surprisingly easy mistakes to make, and even worse, they can have severe security ramifications if they are not discovered promptly. It can happen to anyone, as evidenced by a recent data leak. One of the most popular software developers out there, Microsoft, made a pretty nasty blunder with one particular setting that led to a huge data leak that could have exposed millions of records.

This data leak affected users of Microsoft’s Power Apps, which is a software used by many companies and organizations to share data. Power Apps is used by big-name organizations and agencies like American Airlines, Maryland’s health department, and New York’s Metropolitan Transport Authority. This data leak was discovered by cybersecurity researchers at UpGuard. After identifying that the data leak was a potential security issue, UpGuard notified Microsoft about it.

Thankfully, the issue was promptly resolved, but while the data leak was active, sensitive information like names, Social Security numbers, phone numbers, dates of birth, vaccination records, demographic information, and more was left unsecured. While there is no indication that this information was accessed in any improper way, the fact remains that it was unsecured for an extended period of time and, therefore, vulnerable to attack.

The most unbelievable part of this whole issue is that Microsoft claims that the application was working as intended, which means that the default settings for the software were configured in such a way that this private or sensitive data were unsecured. Microsoft has adjusted the default settings so that there is greater privacy, but they have yet to comment on why it was such a problem in the first place.

You can never be too careful when it comes to your business’ sensitive information, as even the solutions that you believe are properly secured could eventually create a data leak if improperly configured. A security audit might be an effective way to identify these issues, but the fact of the matter is that nobody will find a leak they are not actively looking for, hence why this particular leak occurred and went undetected for so long. People simply had no reason to look for it at first.

ClearView IT wants to help your business ensure that all of the tools you use are not putting your sensitive information at odds or at risk. We can monitor your network for inconsistencies and make sure your solutions are properly configured right from the implementation step.

To learn more, contact us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Windows 10 IT Support Managed Service Apps Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Networking Windows Gadgets Artificial Intelligence Managed IT services Workplace Strategy Mobile Device Management Blockchain App Virtualization Server Remote Spam Information Bandwidth WiFi Encryption Business Technology Gmail Office Apple Two-factor Authentication History Office 365 Information Technology Employee/Employer Relationship Budget Big Data Conferencing Access Control Health Data Security Analytics Cybercrime BDR Wi-Fi IT Management Training Help Desk Hacking Cost Management Employer-Employee Relationship Patch Management Document Management Hacker Remote Computing Vendor Save Money Remote Monitoring Voice over Internet Protocol Compliance Website Computing Vendor Management Hard Drive Data loss Search... Best Practice Retail Alert Legal Money Hiring/Firing Data storage Customer Service Applications Outlook Unified Threat Management Project Management Password Firewall Mobile Office Vulnerabilities Augmented Reality Word Managed Services IBM BYOD Mobile Computing How To Router Google Maps Scam Marketing The Internet of Things Running Cable YouTube VPN Storage Twitter Update Laptop Law Enforcement End of Support Printer Paperless Office Data Breach Antivirus User Social Sports Maintenance DDoS SaaS Travel Virtual Reality Remote Workers Social Engineering Cryptocurrency Chrome iPhone Windows 11 Monitoring Black Market Cortana Websites Windows 7 Education Free Resource Healthcare Cleaning Meetings Mobility Content Filtering Robot Presentation Processors Computers Specifications Bitcoin Solutions Solid State Drive IT Consultant Telephone Images 101 Integration Display Customer Relationship Management Co-Managed IT Chromebook Drones Entertainment Excel Automobile Tech Terms Employees Wireless Technology Managed IT Avoiding Downtime How To Digital eWaste Holidays Microchip Virtual Assistant Flexibility Taxes Downtime Safety Cooperation Video Conferencing Hack Identity Theft HIPAA Virtual Machines Notifications Virtual Desktop Processor Experience Unified Communications Computer Repair Physical Security Professional Services Google Docs Bluetooth Distributed Denial of Service Office Tips Memory Disaster Start Menu Private Cloud Computer Care Managed Services Provider Downloads Multi-factor Authentication Vulnerability Virtual Private Network PowerPoint Lithium-ion battery Software as a Service Administration Politics Saving Time Current Events Settings Data Protection Machine Learning Business Intelligence Supercomputer FinTech Workplace Banking Google Calendar Error Google Wallet Deep Learning Virus CES IT Assessment Messenger Bookmark Value Term Securty Download Piracy Phone System Motion Sickness Supply Chain Management Organization Scams Cyber security Business Metrics Comparison Hosted Solution Domains Google Drive HTML Browsers Nanotechnology Smart Devices Books Google Play Language Knowledge Upload Society Corporate Profile Software License Remote Working Employer Employee Relationship AI Cables Trend Micro Television Social Network Telephony Data Analysis Monitors Screen Reader Visible Light Communication Cabling Digital Security Cameras Computer Accessories Electronic Health Records Reading Transportation Wasting Time Security Cameras Trends Windows 8 Public Speaking Tablet Mobile Technology G Suite Devices Tracking Point of Sale eCommerce Modem Streaming Media Mouse Customer Resource management VoIP Fileless Malware Displays Advertising Keyboard Videos Tip of the week Surveillance Relocation Shortcuts Managing Costs Work/Life Balance Gamification Tech Support Hard Drives Company Culture Web Server Regulations intranet Digital Payment SSID SharePoint Telephone System Directions Wireless Backup and Disaster Recovery Shortcut Worker Media Development Employer/Employee Relationships Be Proactive In Internet of Things Virtual Machine Content Heating/Cooling Access Desktop Environment Time Management Accountants Troubleshooting Social Networking Public Cloud Reviews Optimization Hacks Windows XP Electronic Medical Records Network Congestion Teamwork Writing Database 2FA Reliable Computing Data Storage Workplace Strategies Hypervisor Audit Spyware Equifax File Sharing Shopping Medical IT Health IT SQL Server Redundancy Tactics Paperless Hard Drive Disposal Scalability PCI DSS Administrator Licensing Text Messaging Username Proactive IT Cache Unified Threat Management Startup Business Owner Workers Gig Economy Freedom of Information Humor Bring Your Own Device Azure Navigation Staffing Addiction Business Communications email scam Internet Service Provider CCTV Regulations Compliance Smart Technology Managed IT Service Printing Music IP Address Mobile Security Touchscreen Legislation News Memes User Tip Evernote Emergency Network Management Human Resources Computer Malfunction Net Neutrality Financial Data Botnet Vendor Mangement Emails Inbound Marketing Samsung Risk Management Fake News IT Rental Service Proxy Server Micrsooft Flash Recovery Service Level Agreement Competition Uninterrupted Power Supply Google Apps Computing Infrastructure Webcam Telework Supply Chain Telephone Systems Management Business Growth Business Mangement Device security Wireless Headphones Entrepreneur Tablets Smartwatch Microsoft Excel Communitications Microsoft 365 LiFi Tech Documents Going Green Electronic Payment Application Business Cards Procurement

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?