We recently reported on a data leak by hackers on Goldman Sachs CEO and Chairman, Lloyd Blankfein earlier this week. Since then, news reports have been developing regarding the connection of online activism and protests against Wall Street and the financial system.
“Members of the Anonymous collective are not just taking their activism to the Internet and the streets; they’re now targeting corporate financials with a securities research arm,” according to CNET, who displayed a type of logo for Anonymous, describing the organization as “Acquiring information through unconventional means”.
The unconventional means that are being described here have to do with the power that hackers have to infiltrate any computer or device that is connected to a network. In support of the hacker group Anonymous’s “anti-corporate, anti-censorship, pro-civil liberties messages” connected to the “Occupy Wall Street” movement, hackers have been using their skills for social activism.
Hackers found the personal information of Deputy Inspector Anthony Bologna and posted it online, after the officer was accused of spraying protesters with pepper spray in a video widely circulated on the internet. According to the NY Post, “the hackers collective known as Anonymous put out the name and personal details of a high-ranking cop who pepper-sprayed penned-in Wall St. protesters over the weekend”.
Efforts by the hacking collective appear to be focused around the strategy of releasing the sensitive personal information of its targets.
The eminent need for mobile device protection continues to grow. As we’ve pointed out several times in the recent past, we’ve entered a time in history in which mobile device security cannot be disregarded. Confidential company data that is analyzed and processed through devices that are susceptible to loss or theft holds immeasurable value. It’s not just competing companies that would like to access industry secrets held within your laptop, tablet or mobile phone, but state-supported hacking organizations and foreign cybercriminal rings that might find you and your information interesting if it were worth it to them.
Lloyd Blankfein, CEO and Chairman of Goldman Sachs found himself to be the victim of cybercriminal efforts recently, according to CNET.
Hackers released the personal information of Blankfein, “including the CEO’s age, recent addresses, details of litigation he has been involved in, as well as registration information for businesses, but no sensitive information such as financial data”.
We emphasize the fact that your Keeper account is encrypted from the moment that your enter data into the program, according the the key that is established when you create your Master Password. This way only you hold the key to your data secured in the Cloud Security Vault™.
“By encrypting data themselves, using software with no backdoor, sites can assure themselves of privacy. The cloud provider, government officials, and hackers cannot get at the data in usable form.” Andrew Binstock, Dr Dobb’s
We saw a video on the mobile security standards that are being developed by the National Institutes of Standards of Technology (NIST). Our mobile security software, Keeper® Password and Data Vault stays one step ahead of the standard and leads the way by having addressed the major issues that this government agency is just beginning to identifying as the most important elements of mobile security software in its key features.
Keeper Enterprise allows the administrative control of the content and data on an employee’s mobile device, meaning that access to the encrypted data stored and managed within Keeper can be remotely wiped when it is decided that the information needs to be restricted.
In addition to this infinitely valuable function for enterprise users is the flexibility of Keeper. Our developers work steadily throughout the year to not only improve the software, but to also make sure that it can be used by as many people as possible. Available in the widest platform base of any mobile security software, Keeper provides the benefit of a standard of mobile security that does not require regulating an organization to use the same mobile device.
Our application works consistently with 99% of the mobile devices and operating systems on the market, meaning that a company would not have to restrict mobile device usage but could allow their employees to use Keeper on whatever is available—while still retaining control of what is stored within it. This addresses the concern expressed within the aforementioned video regarding the statement that the “many and evolving platforms are a moving target for standards and practices”— Keeper itself evolves quickly and constantly so that you are always protected on all fronts.
The key feature of Keeper® Password and Data Vault’s mobile security software lies in the 128-bit AES encryption that the application uses to protect the data from the user end, as it can only be decoded using the password established by the user. This article illustrates why anyone who accesses or stores critical information on their mobile devices needs to protect this information through encryption.
“The consequences of leaving behind these devices is difficult to quantify, but people traveling for business or pleasure are likely to access their company’s corporate network, favorite website or online merchant, resulting in sensitive information residing on endpoint devices. If unauthorized individuals can obtain one or more of the devices left behind at an airport, and the device is not encrypted, the consequences could be severe.”
Callpod’s CEO Darren Guccione was honored to be named in the Techweek 100 as one who is “impacting the business and technology landscape on a global scale, from managing fast-growing technology companies to inventing new computer programming languages”: http://techweek.com/conference/techweek-100/
A lot of exciting developments are in the works at Callpod. We have a some changes in the works that are designed to make Keeper better and more widely available to our users. A lot of you may have seen our requests for feedback—we’re trying to gauge the best ways to protect you based on how you use the software and what you want out of it. We greatly value and listen to our users.
In recent months, we’ve rolled out new versions for different platforms- Keeper® is still the most widely supported security software available. Our Windows Phone, Chrome and Cisco Cius versions have been finished, providing more ways to conduct your business online without being exposed to the possibility of identity theft. Keeper is gaining thousands of new users every day.
The need for protection is only becoming more imperative, as an increase in hacking of usernames and passwords has made programs like Keeper inestimably important to users. Keeper is the most feature-rich security software on the market- and for good reason. When a program that encrypts data, such as Keeper, is coupled with a long and complex password there simply isn’t enough time in the world for a hacker to gain access to your authentication information. Decrypting the data based on a random string of characters makes it exponentially harder to hack than making the fatal mistake of using common passwords on more than one site.
We’ve made it easier to protect you by adding the Password Generator feature. Can’t think of an irregular string of characters on the fly? Keeper will do this for you, in addition to managing these passwords and storing them encrypted in our Cloud Security Vault™.
Current events in hacking illustrate better than we can why and how these features benefit you. Basic defense against hackers does not need to translate to inconvenience. Our subscribers know that Keeper is a simple program- they tell us that it is clean, elegantly designed, and intuitive. More importantly, they use Keeper every day.