My spin:I love Google. It’s a great, simple but vast search engine. So it’s not only one of my top resources for technical support information but also what I use to find out information on people before I meet them. Let’s say I’m going to have lunch with business lady XYZ. Well, I’ll first “Google” her and see what turns up. The results can often give me background information on who the person is and what they’ve done.
What else does this mean. COMPANIES need to ensure they put their critical information behind firewalls and in a secure place that Google or other search engines can not reach.
Washington Post: Sitting at his laptop, Chris O’Ferrell types a few words into the Google search engine and up pops a link to what appears to be a military document listing suspected Taliban and al Qaeda members, date of birth, place of birth, passport numbers and national identification numbers.
Another search yields a spreadsheet of names and credit card numbers.
“All search engines will get you this,” O’Ferrell said, pointing to files of spoils he has found on the Internet: Medical records, bank account numbers, students’ grades, and the docking locations of 804 U.S. Navy ships, submarines and destroyers.
And it is all legal, using the world’s most powerful Internet search engine.
Cybersecurity experts say an increasing number of private or putatively secret documents are online in out-of-the-way corners of computers all over the globe, leaving the government, individuals, and companies vulnerable to security breaches. At some Web sites and various message groups, techno-hobbyists are even offering instructions on how to find sensitive documents using a relatively simple search. Though it does not technically trespass, the practice is sometimes called “Google hacking.”
Latest posts by Ramon Ray (see all)
- 3 Creative Ideas to Boost Your Local Marketing Campaigns - December 11, 2017
- Vistaprint Report Says Many Consumers Will Shop More Small Businesses in 2018 - October 2, 2017
- Kensington Announces Ultimate Presenter with Virtual Pointer - October 2, 2017