Author Archives: Aaron Turner

O365 Security: You Get What You Pay For…. US Treasury & Commerce Hacks Expose Microsoft

It was made aware to the public via media reporting that a group of sophisticated attackers had gained unauthorized access to internal US Treasury and Commerce Department systems. Now, we don’t have the full technical details of how these compromises were accomplished, but we do know from both press reporting and personal sources familiar with the incident response, that the scale of the breach was amplified due to the relatively immature security capabilities offered in Microsoft O365 services such as Exchange Online and Teams.  

Continue Reading »

COVID-19: How Your Organization Can Stay Compliant & Secure While Working From Home

According to the World Health Organization, COVID-19 is now officially a pandemic.

The impact of COVID-19 struck close to home for me this week as at least two attendees at the annual RSA Conference fell ill to the virus.  I spent the entire week in San Francisco at the RSA Conference catching up with longtime friends, speaking in several sessions and walking the Expo floor.  For myself and our company, HighSide, I’m grateful to have no symptoms two weeks post-conference and that our company enables employees to work from wherever they have an internet connection to stay productive.

As the virus continues to spread, new regions are quarantined and companies begin their work from home contingency plans, our customers handling regulated and sensitive data have begun asking us how they can ensure continuation of operations from home.

Continue Reading »

What The Bezos Phone Hack Means For Business Executives

This article was originally published on Silicon Luxembourg on Feb. 4th, 2020

For the last several months, many of us in the mobile technology security community have heard rumors about Jeff Bezos’ iPhone. Not that he had access to a special new model or something good, but something quite bad – that his iPhone had been remotely compromised by a well-funded group to gain access to his personal information as the result of a business deal gone bad.

What is surprising about this security incident is that Bezos has access to some of the best cyber security professionals in the world. He has a dedicated team who looks after his physical and cyber protection. If this type of attack can be successful with Bezos as the target, then nearly anyone is just as vulnerable (probably more so because most don’t have the cyber protection resources Bezos does).

Continue Reading »