Digital key in pixeled keyholeENCRYPTION

APPLE: iOS Might Have a Backdoor That Can Be Used to Hack into any iPhone, even the iPhone X. Apple has been advertising its focus on user data security and privacy for years now. Encryption ensures data security as long as you protect your devices with a password, pin, fingerprint, or face. Nobody should be able to access the contents of your iPhone without access to your password, and that’s why the FBI tried to force Apple in early 2016 to create a backdoor into an iPhone belonging to the San Bernardino shooters. Ultimately, the FBI backed down because it discovered it could use a third-party’s services to access the password-protected iPhone. In other words, someone found a backdoor into Apple’s 2016 software and was able to use it to access the contents of encrypted iPhones. Fast forward to 2018, and it looks like a similar backdoor still exists and can unlock encrypted any device, including the iPhone X. Read more
[BGR.COM]

STATE & LOCAL GOVERNMENT: As Google’s Deadline for Web Encryption Looms, Many State and Local Websites Don’t Meet the Standard. The most popular Web browser wants every page on the Internet encrypted. Government is still behind. Read more
[GOVTECH.COM]

TECH GUIDE: How to Encrypt Your Text Messages for Private Conversations on iPhone and Android. If you want to send messages without worrying that other people might be poking around in the texts you’re sending, you should be using an encrypted messaging service. Read more.
[CNBC.COM]

SMARTER LIVING: The One Thing That Protects a Laptop After It’s Been Stolen. When your laptop is lost or stolen, you aren’t just out $800 (or more). Your personal information is also accessible to whoever takes it, even if you have a password. Good news. You can protect your data against this type of attack with encryption. Read more.
[NYTIMES.COM]
==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems February 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-february-2018.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Encryption – Daily Tech Update – March 20, 2018

Leave a Reply