Most businesses, offices, and organizations have now gone digital. It means that most processes are no longer done the usual pen and paper way but rather computerized. Important company or business records or files are encoded on a computer for ease of use and convenience. You can just pull one up when you need it and no longer need to sort through piles of documents to get what you need.

No matter how convenient this advanced technology has made everyone’s life, it also has its flaws. Computer servers are at high risk of hacking. Hackers will do their best to steal important data for profit or mess with a server’s system to show the world how unstoppable they have become.

Even big companies like Apple have server issues. And Apple will not sit around and put at risk the safety and security of their users and their data.

A new report today from The Information shares that Apple found potential security issues with at least one server early last year. Apple purchased the server from Super Micro Computer and was used to help power its web services and also contained customer information.

Apple did not hesitate to sever ties with the company that is supplying their servers even despite being partners in the business for a long time.

Apple ended up terminating its years-long business relationship with Super Micro, according to Tau Leng, a senior vice president of technology for Super Micro, and a person who was told about the incident by a senior infrastructure engineering executive at Apple. The tech giant even returned some of Super Micro’s servers to the company, according to one of the people briefed about the incident.

There were apparently no breaches of any kind, but the potential threats were serious enough that Apple decided to end the relationship with Super Micro Computer.

 Apple provided The Information with a generic statement on the matter, “Apple is deeply committed to protecting the privacy and security of our customers and the data we store,” said an Apple spokesman. “We are constantly monitoring for any attacks on our systems, working closely with vendors and regularly checking equipment for malware.”

(Via: https://9to5mac.com/2017/02/23/apple-server-vendor-security-issues/)

Even prominent personalities like world leaders are not safe from hackers. These people have a lot to lose once hackers get a hold of their important personal details. Vice-president Mike Pence is the newest hacking victim to make the headlines. His mistake was that he used his personal email instead of a government-issued one which is supposedly more secured.

Vice President Mike Pence routinely used a private email account to conduct public business as governor of Indiana, at times discussing sensitive matters and homeland security issues.

Emails released to IndyStar in response to a public records request show Pence communicated via his personal AOL account with top advisers on topics ranging from security gates at the governor’s residence to the state’s response to terror attacks across the globe. In one email, Pence’s top state homeland security adviser relayed an update from the FBI regarding the arrests of several men on federal terror-related charges.

Cyber-security experts say the emails raise concerns about whether such sensitive information was adequately protected from hackers, given that personal accounts like Pence’s are typically less secure than government email accounts. In fact, Pence’s personal account was hacked last summer.

(Via: http://www.indystar.com/story/news/politics/2017/03/02/pence-used-personal-email-state-business—-and-hacked/98604904/)

While server security is often done at a bigger scale, hackers can still target ordinary citizens and steal their personal data. We should all take cyber security seriously as it has great implications. Committing a small mistake like a lax in security can compromise your computer’s integrity and introduce dangerous malwares and viruses that can serve as the vehicle for hackers to access your system. Cyber vigilance should be everyone’s responsibility to deter hackers from hacking systems big or small.

Leave a Reply

Your email address will not be published. Required fields are marked *