当前位置:网站首页>Japanese government and enterprise employees got drunk and lost 460000 information USB flash drives. They publicly apologized and disclosed password rules
Japanese government and enterprise employees got drunk and lost 460000 information USB flash drives. They publicly apologized and disclosed password rules
2022-07-07 13:09:00 【Internet Security Research Institute】
In recent days, , Staff in nizaki, Japan lost their belongings due to drunkenness 46 Name of 10000 Japanese citizens 、 address 、 Tax payment amount and other sensitive personal information U The matter of the plate attracted attention . City officials held a press conference to publicly apologize , But inadvertently revealed U Disk password digits and composition rules .
According to the Japanese media , Equipped with nizaki City, Hyogo Prefecture, Japan 46 ten thousand 517 Personal information of citizens U Pan Yu 21 Lost by accident , It contains the names of all citizens 、 address 、 Date of birth and amount of tax paid .
6 month 23 Japan , The city government officials held a press conference , Just U Apologize for the accidental loss of the disk . At the meeting , Site officials said , Nizaki municipal government outsourced the business of granting subsidies to the third-party enterprises , The staff of the enterprise have no permission , Copy citizen information into U disc , On 21 Daily carry U I went to Kaida City, Osaka Prefecture to deal with business . The employee did not delete the data after processing , evening 7 Take it at halfpastten U Pan and his colleagues went to a restaurant to have a drink about 3 Hours , evening 10 I got drunk and fell asleep on the road on my way home at halfpastten .22 Early morning 3 Wake up , It was found that U The briefcase on disk is missing , Immediately call the police and report to nizaki city .
At the press conference, relevant officials said ,U The disk password is hard to crack , Call the password a total of 13 digit , It consists of English letters and numbers .
This answer was ridiculed by netizens , This is it. “ The ultimate negative teaching material ”. On the Internet , Many netizens have given 13 Bit password guessing , The loudest voice is “Amagasaki2022”—— The English words of nizaki plus the year 2022. Whether the password is true as guessed by netizens 、 Before finding the briefcase U Whether the disk password has been cracked , The results of the investigation by the nizaki police are yet to be seen .
Based on the above events , Should we also “ Look in the mirror ”, Whether our government and enterprises are U Disk usage 、 The data transfer 、 Data usage 、 There are similar security risks in data management ?
Enterprises usually have complete, detailed and strict rules and regulations , But there are still various loopholes , In addition, the network environment is complex , There are many uncertain factors , Timely detection and prevention of data leakage has become a key problem that every enterprise must face .
Enterprises in network security 、 Data security protection will go through two stages
The first stage , Enterprises mainly adopt passive defense methods . These companies put all their energy and investment into building a strong external defense , But today these may no longer work .
Second stage , Establish a proactive security strategy . today , Everyone in the industry has realized , Network security vulnerabilities can exist in the company's network for a long time , It's hard to detect , And will continue to appear . The vulnerability that initially led to the disclosure of enterprise data may be unknown , They may exist until they are discovered . therefore , Enterprises have gradually changed from passive to active .
The transformation trend has taken shape . Enterprises begin to realize that safety protective measures should be , External defensive measures and internal defensive measures , Both are necessary . We have fully recognized the need to establish a modern security posture through targeted strategies and new investments .
The best way to protect sensitive data , That is, take the initiative to do a good job in prevention and control before the incident . Don't wait for security problems to make amends and apologies .
that , What protective measures should government and enterprise institutions take ?
1. Data encryption
Data encryption is more reliable than simple password protection . At present, data encryption is still the most reliable way for computer systems to protect information . Use password technology to encrypt information , Achieve information concealment , So as to protect the security of information . Even if the password is cracked , Irrelevant people can't get the real content , And it is impossible to copy data .
2. The Internet transmits data safely
Data encrypted transmission , Third parties cannot steal through technology and other tools 、 Tamper with protected information data , Ensure data security and integrity , Avoid data leaks 、 The occurrence of fishing and other events .
3. Internal data control
Internal leakage is one of the root causes of enterprise data leakage , Possible intentional or unintentional misconduct by internal employees , Is the key cause of data leakage .
边栏推荐
- PACP学习笔记三:PCAP方法说明
- MATLAB中polarscatter函数使用
- Day26 IP query items
- 迅为iTOP-IMX6ULL开发板Pinctrl和GPIO子系统实验-修改设备树文件
- Enterprise custom form engine solution (XII) -- experience code directory structure
- Practical example of propeller easydl: automatic scratch recognition of industrial parts
- 如何让electorn打开的新窗口在window任务栏上面
- 10 张图打开 CPU 缓存一致性的大门
- Shortcut key of Bash
- php——laravel缓存cache
猜你喜欢
How to continue after handling chain interruption / sub chain error removed from scheduling
Sed of three swordsmen in text processing
人均瑞数系列,瑞数 4 代 JS 逆向分析
MySQL入门尝鲜
Leetcode question brushing: binary tree 26 (insertion operation in binary search tree)
JS缓动动画原理教学(超细节)
线程池拒绝策略最佳实践
Leetcode skimming: binary tree 25 (the nearest common ancestor of binary search tree)
About the problem of APP flash back after appium starts the app - (solved)
《ASP.NET Core 6框架揭秘》样章[200页/5章]
随机推荐
自定义线程池拒绝策略
Day-24 UDP, regular expression
MySQL导入SQL文件及常用命令
“新红旗杯”桌面应用创意大赛2022
Cmu15445 (fall 2019) project 2 - hash table details
Sample chapter of "uncover the secrets of asp.net core 6 framework" [200 pages /5 chapters]
MongoDB 分片总结
事务的七种传播行为
Pay close attention to the work of safety production and make every effort to ensure the safety of people's lives and property
What if the xshell evaluation period has expired
基于鲲鹏原生安全,打造安全可信的计算平台
解决缓存击穿问题
2022a special equipment related management (boiler, pressure vessel and pressure pipeline) simulated examination question bank simulated examination platform operation
The difference between cache and buffer
Leetcode skimming: binary tree 27 (delete nodes in the binary search tree)
File operation command
日本政企员工喝醉丢失46万信息U盘,公开道歉又透露密码规则
[untitled]
《开源圆桌派》第十一期“冰与火之歌”——如何平衡开源与安全间的天然矛盾?
货物摆放问题