Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Microsoft Notifies BPOS Cloud Customers of Breach

December 25 2010

Microsoft has notified all the customers affected by a configuration error that impacted the company's cloud-based Business Productivity Online Suite and exposed corporate data.

A configuration error recently exposed corporate data belonging to customers of Microsoft’s cloud-based Business Productivity Online Suite (BPOS).

BPOS is a set of messaging and collaboration tools that includes Microsoft Exchange Online, Microsoft SharePoint Online, Microsoft Office Communications Online and Office Live Meeting. According to the company, the configuration issue exposed information in customers’ Offline Address Books, a feature in Exchange that permits Outlook users to access copies of e-mail addresses when users are not connected to Exchange.

Microsoft confirmed the breach in a statement, and said the problem was fixed within two hours of discovery. The company did not say exactly how long the error existed, but stated that only a limited number of improper downloads took place. According to Clint Patterson, Microsoft's director of BPOS Communications, the issue only affected Business Productivity Online Suite–Standard customers; no other Microsoft Online Services were impacted.

“Our records indicate that a very small number of downloads actually occurred, and we are working with those few customers to remove the files,” he said in a statement. “This issue applied to Offline Address Book information only, and no other information was affected. Offline Address Book contains an organization’s business contact information for employees. It does not contain Outlook personal contacts, e-mail, documents or other types of information.”

Still, the data breach is a "stark reminder" that companies putting sensitive data in the cloud need to ensure they are implementing sound security and risk management strategies to protect that information from being accessed by unauthorized users, said Kurt Johnson, vice president of strategy and corporate development at Courion.

“The cloud introduces new risks that could potentially impact overall data security,” he said. “This includes issues that may inadvertently, as in this case, provide access to unauthorized users. This is often overlooked by companies and is something that is critical to proper data protection.”

View more news

 
  Most Popular
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html