Articles Telegram has implemented a panic button to block data...

Telegram has implemented a panic button to block data leaks

-

Corpsoft24, a company specializing in the provision of cloud services, has developed a panic button for customers in the form of a Telegram bot. When the code word is sent to the chat, it initiates blocking access to web resources, thus preventing the leakage of corporate data.

Any employee of the company who has installed the Telegram messenger can use the panic button if there are signs of an attack. Emergency shutdown of servers and virtual machines hosted in the cloud is performed according to a scenario previously approved by the customer.

“Today everyone has a Telegram messenger, as well as a phone, so you can use it right away without purchasing and wearing mechanical devices, such as a key fob,” comments Konstantin Renzyaev, CEO of Corpsoft24. “In addition, using the messenger, you can automate any commands without significant costs.”

According to Renzyaev, panic buttons came into use in Russia more than 20 years ago. Such tools were usually implemented in the form of an encryption key, a hard drive destruction mechanism, a key fob, or a bell. Over time, more advanced technologies have appeared that are suitable for protecting large businesses, which invariably attract the attention of cybercriminals.

Unfortunately, it is not uncommon for hackers to catch businessmen by surprise, because they did not think about the prevention of leaks in time – despite the fact that the information security market provides such opportunities. At present, according to Renzyaev, transferring important data to the cloud and setting up such additional protection as a panic button can be done in a couple of days.

As an alternative, Corpsoft24 has also released a mechanical panic button. When pressed, it sends a signal to the information security or IT service of the company, so that specialists can take appropriate measures – turn off servers, block access to data.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries...

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues,...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity,...

You might also likeRELATED
Recommended to you