Skip to content

What is a data leak

“Data leak jeopardizes more than 150 million users.” “Hacker leaks 33 million usernames and passwords.” Sound familiar? As security technology advances and becomes more sophisticated, companies struggle to keep up with the latest requirements. Hardly a day goes by without news about a new data leak or a breach. Let’s find out how they differ and how to prevent your company’s data from leaking.

First, what is data leakage? In short, it’s a security incident where private information becomes available to unauthorized parties. People may steal, accidentally transfer, or willingly give it away. Leaked data can be digital (electronic files) or physical (documents, letters, pictures, devices). However, data leaks are not the same thing as data breaches.

Data breach vs. data leak: What’s the difference?

While you might sometimes see these terms used interchangeably, conflating them isn’t wholly accurate. Both carry the same consequence – unauthorized data exposure. The difference lies in the cause.

Data leaks typically happen due to poor security measures or someone’s accidental actions. In most cases, cyber leaks aren’t meant to be malicious, and human error is at fault. Security researchers from vpnMentor have been exploring open databases for years. One of their most significant findings was in 2020 – they discovered that the Key Ring app had used a misconfigured Amazon S3 bucket to store 44 million records, including people’s IDs, insurance information, driver’s licenses, and credit cards. Even if no malicious actors noticed it before them and the company took care to close the database, it still counts as a data leak.

On the other hand, data breaches are deliberate. A data breach occurs when a cybercriminal attacks a company or a database and manages to obtain secret and sensitive information. Common tactics used during data breaches include DDoS attacks, malware, and social engineering that can break the company’s defenses. The outcomes of data breaches and leaks are similar, but leaks lack the malicious intent of breaches.

Types of data leaks

If you want to spot data leaks quickly, you need to recognize the different incidents and strategies that may be causing them.

  • Human error

    An unintentional leak can be caused by something as trivial as sending a confidential email to the wrong address. Leaving a database with your customers’ data publicly accessible or losing a device with access to the information are also considered accidental data leaks. However, the consequences depend on who got the email or found the loophole allowing them to access the database. Some might delete it while others might get sneaky ideas.

  • Scams and system breaches

    Sometimes, people look for vulnerabilities in your security, like out-of-data software or system bugs, to prove that they exist. They will not attack you openly. Instead, they look for loopholes to access information that’s not supposed to be accessible from the outside. Others might employ social engineering tactics to create the perfect environment for a data leak.

  • Intentional data leak

    Although data leaks often aren’t malicious, they may still be deliberately instigated. A situation can result from an employee who accesses the company’s secrets or users’ records to resell for financial gain. It might also be a whistleblower who has moral objections to what they witness in their company and uses the leaked information for exposition. Either way, they know what they are doing and usually try to remain anonymous as they work from the inside.

What type of data is at risk?

Data leaks are a disaster for the victims and a golden opportunity for cybercrooks, who usually look for impacted sensitive information to make a sizable profit. They go after identifiable information such as names, addresses, social security numbers, and credit card details. Such data can then be used for identity theft and money laundering. Stolen login credentials are often packaged into password leak databases and sold on the dark web.

When bad actors look to hurt a specific business, the information they go after might expand beyond personally identifiable data. For instance, they may target sensitive company information like internal communications or strategic plans. Trade secrets and intellectual property, such as proprietary code and software, can also be on the radar.

Today, data is paramount. With the increasing frequency of cyberattacks, businesses have to take serious steps to ensure the ironclad security of their data.

How is the leaked data used?

Once hackers have their hands on leaked or stolen data, they can exploit it for their goals. Here are a few ways exposed data can be used for nefarious purposes.

Social engineering

Leaked data often includes identifiable information like names, passwords, and email addresses. Hackers can use that information in social engineering attacks. Phishing is an attack during which hackers send out fake emails that impersonate a reputable source to get the potential victim to download a malicious attachment or click on a dangerous link. Without password leaks, hackers would be less successful in targeting and carrying out their attacks.

Doxing

Doxing, or doxxing, is the act of exposing identifiable information, such as a person’s name, home address, and phone number, with malicious intent. After acquiring leaked data, hackers usually have more information than they need to dox a person. Doxing is often targeted against a specific person or group of people and has historically been used in harassment campaigns.

Slowdown or disruption of business operations

A data leak can have a tremendously negative impact on the affected organization. According to the National Cyber Security Alliance, an astounding 60% of companies go out of business within six months after falling victim to a data leak.

Real-world examples of data leaks and breaches

Data leaks and breaches are more common than ever, and experts believe that the frequency of such cyber incidents will only rise in the future. Here are a few major incidents that had companies around the world on their toes – some carrying graver consequences than others:

  • ChatGPT

    In March 2023, a bug was discovered in OpenAI’s chatbot ChatGPT, leading to the leak of customer data, including their names, chat titles, and limited credit card details. The team emphasized that full credit card numbers were not exposed, and the leaked data was limited to the last four digits of the credit card numbers, as well as the expiration dates. The platform was temporarily taken offline to fix the bug.

  • Credit Suisse

    In February 2022, a whistleblower initiated a data leak to expose a number of high-profile criminals who were employing the services of the Swiss bank Credit Suisse. The scope of the leak affected over 18,000 accounts. The exposed data was shared with the German newspaper Süddeutsche Zeitung, which published an exposé on the Swiss banking system.

  • Twitch

    In October 2021, the live-streaming platform Twitch revealed it had experienced a massive data breach. The breach exposed over 100 GB of sensitive data, including the streamers’ names, addresses, email addresses, and earnings.

  • Facebook

    On April 3, 2021, a security expert discovered a massive data leak that affected 533 million Facebook users. Overall, the leak produced 2,837,793,637 data points. On average, hackers exposed at least five types of data per user, including phone numbers, full names, dates of birth, Facebook IDs, email addresses, and user bios.

  • Experian

    In February 2021, reports came out about the most significant data breach in Brazil’s history, which exposed the sensitive information of more than 200 million people and 40 million companies. The culprit was suspected to be Serasa Experian, a company providing information and data services. The exposed data included personally identifiable information like dates of birth, full names, addresses, headshots, credit scores, income, and other financial data.

How to prevent data leaks and breaches

To minimize the risk of a data leak, you must establish security practices and procedures in your company. Remember that you can’t always control every single thing security-wise. You can never know if or when you might become a target. However, taking a few preventive measures will give you peace of mind.

  • Control your data

    You should always keep backups of your data – that said, don’t store unnecessary copies. Keeping your sensitive information in one secure database instead of multiple terminals will reduce the chances of it leaking. Knowing and controlling who has access to what information is also essential. Employees should only be allowed to access the data they need for their work. This way, you can avoid accidents and intentional leaks.

  • Place restrictions on your employees’ emails

    You can set up Google Drive to notify your employees whenever they attempt to share the company’s files with an outside party. Also, set up spam and phishing filters to cut the risk of successful social engineering attacks.

  • Train your employees

    A basic understanding of potential cybersecurity risks is essential for everyone in your company, especially those handling sensitive data. Receptionists and head analysts alike should be aware of social engineering attacks, malware types, and internal security requirements. If they know and understand how much damage a data leak would do to the company, they will act more carefully.

  • Establish strong security measures in your company

    Use firewalls to protect your network and restrict specific traffic. Ensure you’re safe from malware, like ransomware, spyware, or keyloggers. Use a VPN with robust encryption to ensure secure connections, especially if your employees often travel or work from home. Ensure they use strong passwords and enable two-factor authentication for their most sensitive accounts. Encourage using a password generator to create complex passwords, storing them safely in an encrypted vault and updating them frequently to avoid password leaks.

  • Prepare for the worst

    No one wants to go through the worst-case scenario, but accidents can happen. Therefore, it’s a good idea to set up a response and damage control plan in case of a data leak. If you suffer a cyberattack, every minute is precious, and being able to act fast could save you a lot of money – and customers’ trust – in the long run.

  • Establish proper cloud storage security

    Ensuring the security of data stored in the cloud is imperative. Without appropriate security measures, sensitive information can be exposed and stolen. Take your time configuring your cloud storage following the best security practices, and if necessary, adopt additional tools to protect your cloud storage.

  • Evaluate and monitor third-party risks

    Even if you can ensure complete security within your organization, remember that your data can be exposed via third parties such as your partners and vendors. Supply chain attacks are on the rise, and businesses need to evaluate their partnerships with third parties security-wise to minimize the risk of falling victim to data leaks.

Data leak prevention practices

First, find out what kind of data was leaked. Account names, email addresses, and passwords often end up in data leaks. If your account was affected, change the password as soon as possible. If you use the same password anywhere else, you must change it over there, too. If you don’t, you will be susceptible to a credential-stuffing attack, and all your online accounts will be at risk. If your credit card or banking details were affected, contact your bank immediately and block your cards.

If your business experiences a data leak, swift action is vital. Make sure to contain the leak as soon as you discover it. Immediately start a detailed probe into what exactly happened and why. Inform your customer base about the leak. Disclose all the relevant information: the date and type of the leak, as well as the affected systems and users. Finally, upgrade your organization’s security infrastructure to lower the risk of future cyber incidents.

Bottom line

Data leaks are an ever-growing threat in the digital landscape, and staying ahead is as important as ever. If you’re concerned about the safety of your professional and personal data, you can start taking steps to protect it. The first order of business is setting up your business password manager.

NordPass is a password manager that offers encrypted storage for all your sensitive data, whether that’s your login credentials, address, credit card details, or ID information. In addition to your secure vault, you’ll also access features that help reinforce your data safety, like Password Health, which checks whether your passwords are weak or reused, and the Data Breach Monitor, which alerts you if you’re affected by a password data leak. Stay one step ahead of data leaks and start patching the holes in the ship before your information seeps into the wrong hands.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

IPEVO Unveils the P2V ULTRA 4K/13MP Object Camera

[Sunnyvale, CA, Nov 14, 2023] IPEVO, a leader in communication solutions, proudly announces the P2V ULTRA—a compact, portable USB camera that redefines versatility and video quality. Equipped with a 13-megapixel CMOS sensor and 4K video resolution, it offers outstanding performance, including a Super Macro Focus feature for capturing intricate details as close as one centimeter. The P2V ULTRA is the ultimate choice for a wide array of applications. Whether hand-held for flexible manual positioning to different angles or clipped to a laptop’s monitor or mounted on a stand via its magnetic mounting design, it is an innovative solution that elevates convenience and video quality to new heights while ensuring clear communication and presentation of various details and perspectives.

Versatile Usage Options
The P2V ULTRA by IPEVO offers versatile usage options for a wide range of applications. Use it as a handheld camera for hands-on demonstrations from anywhere, as a webcam with a 100-degree field of view for online meetings and live streaming, or as a document camera with an optional multi-jointed stand for demos, presentations, and document scanning up to Tabloid (A3) size using IPEVO SnapCapture OCR software. Its adaptability makes it suitable for education, remote communication, medical, and retail sectors. 

IPEVO P2V ULTRA is a compact, highly portable, and versatile camera adapts to any scenarios.

Super Macro Focus for Precision
The P2V ULTRA features a Super Macro Focus that captures fine textures and details as close as 0.39 inches (1 cm). This allows you to effortlessly display small objects, artwork, or specific parts with precision and clarity, making it ideal for tasks like electronics repair and small component inspection. It also provides high-resolution output in UVC format, enabling seamless integration into various system platforms, including computer vision, AI inference, and edge systems.

Going back to 2007, when IPEVO first launched P2V, it was an immense success worldwide, especially among educators and school teachers who were pleasantly surprised by how effective a camera could be in supporting teaching and learning. The handheld point-to-view camera provides the freedom to view objects from different angles, going beyond the limitations of traditional document cameras.

Aaron Lee, General Manager of IPEVO, said, “Unlike traditional document cameras and webcams, the P2V was designed as a pen-grip camera, allowing users to freely share what they see with their own eyes. With the introduction of the brand-new P2V ULTRA, equipped with a 13MP sensor and 4K resolution, along with Super Macro Focus, we are committed to providing outstanding image quality to you.”

More to Explore
With the one-click snapshot feature and IPEVO Visualizer software, the P2V ULTRA enables you to capture timely images with ease. With just a single click of a button, you can quickly take a snapshot of current visuals, ensuring you won’t miss any important moments in your presentations, demonstrations, or recording sessions.

Additionally, the P2V ULTRA features a built-in microphone with AI noise reduction, ensuring clear message delivery. It’s as simple as plug-and-play for a seamless experience.

P2V ULTRA (Standard Pack) is now officially available for purchase through IPEVO’s global distribution channels. This model comes in two packaging options, with the Standard Pack being the first one introduced:

  • Standard Pack: P2V ULTRA Camera x1 and Camera Clip x1.
  • Full Pack: P2V ULTRA Camera x1, Camera Clip x1, Camera Stand x1 and Camera Clamp x1.

The key features of the IPEVO P2V ULTRA Object Camera:

  1. 13-megapixel CMOS sensor and 4K video resolution.
  2. Super macro focus to view close-up details
  3. 3 in 1 camera: handheld, webcam and document camera (with optional accessories required)
  4. Snapshot button to capture timely images
  5. Compact, lightweight, and portable
  6. USB-C connectivity.
  7. Plug and play on Mac OS, Windows PC, Chromebooks with a USB Type-C port.
  8. Compatible with Zoom, Google Meet, Microsoft Teams, Webex, Skype, GoToMeeting, and other video conferencing software.
  9. IPEVO P2V ULTRA is a product designed in Taiwan.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

CyberLink and Intel Work Together to Lead the Gen-AI Era, Enhancing the AI Content Creation Experience, and Embracing the New Wave of AI PCs

Taipei, TAIWAN – November 13, 2023CyberLink (5203.TW), a leader in digital creative editing software and artificial intelligence (AI), attended the Intel Innovation Taipei 2023. As a long-standing Intel independent software vendor (ISV) partner, CyberLink demonstrated how its latest generative AI technology is used for easily creating amazing photo and video content with tools such as: AI Business Outfits, AI Product Background, and AI Video to Anime. During the forum, CyberLink Chairman and CEO Jau Huang shared how Intel’s upcoming AI PC is expected to benefit content creators by popularizing generative AI creativity from cloud computing to personal computers, to not only reduce the cost of AI computing but, simultaneously eliminate users’ privacy concerns, fostering an entirely new AI content creation experience where it’s even easier to unleash creativity with generative AI. The Intel Innovation Taipei was kicked off by Intel CEO Pat Gelsinger. The event highlighted four major themes: artificial intelligence, edge to cloud, next-generation systems and platforms, and advance technologies, as well as the latest results of cooperation with Taiwan ecosystem partners, including the latest AI PCs, etc. Sam Gao, Intel Vice President, and General Manager of the Client Platform Solutions Group, delivered a speech with the theme of “Winning in the AI PC Era with Intel Client Platform.” During his keynote, he further explained Intel’s AI PC acceleration program to accelerate the development of AI PC.

CyberLink Chairman and CEO Jau Huang presenting during Intel Innovation Taipei

Invited to present and share the use cases of AI PC during Sam Gao’s session, CyberLink Chairman and CEO Jau Huang said, “CyberLink has been Intel’s long-standing software partner for many years and is honored to be one of the first independent software vendors to participate in Intel’s AI PC acceleration program. Through the integration of software and hardware, we can achieve the best AI performance in hardware while continuing to explore new possibilities for innovative applications of AI technology. With Intel AI PC, we look forward to more accessible video creation and creative image editing that will bring AI to the masses.”

Creative editing has never been easier as CyberLink has launched more than 10 new generative AI functions including: AI Business Outfit, AI Fashion Outfits, AI Scene, AI text to image, AI Avatar, AI Sky, AI Sound Effect Generator, and AI Anime. The AI Business ​​Outfit feature in PhotoDirector, provides multiple clothing style options and can generate formal outfits such as suits, allowing consumers to easily transform their personal photo outfits into business attire for resumes or professional photos. Similarly, the newly launched AI Product Background function uses AI automatic generation technology to quickly create suitable background images for products to be displayed on e-commerce websites or product promotions. This functionality not only saves time but eliminates the need for a photo studio, and additional steps for post-production and retouching. Driven by Intel’s plans to launch the Intel Core Ultra processor code-named “Meteor Lake” in December 2023 for AI PC acceleration, CyberLink will launch additional generative AI features in the fourth quarter of this year and beginning of next year, using AI technology to promote innovation in video creation and image editing software. Consumers will be able to enjoy an even better AI creation experience, as CyberLink helps to lead generative AI content creation on a new wave of AI PCs. 

For more information and product details on CyberLink’s Director Suite of multimedia editing software, click here.

To learn more about Intel’s AI PC Acceleration Program, click here.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

FaceMe® Ranks First in NIST FATE Test for Presentation Attack Detection (PAD)

Taipei, TAIWAN – October 17, 2023 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, has achieved the highest ranking in the Video Convenience category of the most recent Face Analysis Technology Evaluation (FATE) tests performed by NIST (National Institute of Standards and Technology). The evaluation tested the performance of 82 passive, software-based presentation attack detection (PAD) algorithms and resulted in CyberLink’s FaceMe® excelling at the top of all three data sets within the Convenience category.

What is NIST FATE PAD Testing?

Under biometric face technology evaluations, NIST has two types of testing scopes: FRTE (Face Recognition Technology Evaluation) and FATE (Face Analysis Technology Evaluation). Testing that pertains to identity verification (who is in an image) falls under FRTE, which CyberLink’s FaceMe is already top ranked for in 1:1 and 1:N evaluations. Testing that involves the processing and analysis of images (what is in an image) falls under FATE. With NIST’s latest internal report, focuses on FATE Presentation Attack Detection (PAD), the performance of passive, software-based PAD for two use cases: impersonation and evasion.

What is Passive Presentation Attack Detection (PAD) and Why is Liveness Detection Testing Important?

A presentation attack occurs when a person tries to “trick” the facial recognition system’s camera so they may either evade a positive identification in a database or impersonate another individual. With passive PAD, a person is not required to do any more than present themselves to the camera, whereas active PAD requires a person to speak, turn their head, etc. to verify their liveness. Some common methods of presentation attacks within impersonation and evasion use cases include holding up a printed photo, presenting video from a smartphone or tablet, or even wearing elaborate silicone masks. Without liveness detection, in the form of PAD, a false positive will occur and the true identity bearer is subject to fraudulent activity. Committed to the prevention of fraud and enhancement of the customer experience, preventing impersonation is of paramount importance to CyberLink as demonstrated by the test results.

Understanding CyberLink’s Impressive PAD Test Results

NIST’s PAD test is separated into two categories: convenience and security. Under convenience, the True Acceptance Rate (TAR) is fixed to 99% and sorted by True Rejection Rate (TRR). In NIST’s FATE PAD video convenience category FaceMe® ranked first, based on the results of three different video tests in which FaceMe® achieved 100% True Rejection Rate, correctly stopping 100% of presentation attacks, when the True Acceptance Rate was set 99%.

With FaceMe’s already superior FRTE rankings, perfect iBeta’s PAD Level 2 test score, and now top NIST FATE PAD ranking, CyberLink’s dedication to excelling at not only facial recognition accuracy, but also liveness detection is clear. “Facial recognition does not work if it can be easily fooled,” said Jau Huang, Chariman and CEO of CyberLink. “CyberLink has invested heavily to ensure that FaceMe’s presentation attack detection is second to none, now solidified with NIST’s evaluation results.”

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

CyberLink FaceMe® Security Integrates with Hanwha Vision Wisenet WAVE VMS to Enable AI Facial Recognition

Taipei, Taiwan – October 4, 2023 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technology today announces FaceMe® Security integration with Hanwha Vision’s Wisenet WAVE VMS. FaceMe® Security now seamlessly integrates with Wisenet WAVE to add AI facial recognition, allowing Wisenet WAVE users to painlessly upgrade existing smart security and access control infrastructure with detection of blocklisted individuals, real-time alerts, employee access control capabilities, and optimized facial search, which can lead to faster video investigations.

FaceMe Security Integrates with Hanwha Vision

Hanwha Vision’s Wisenet WAVE VMS is a lightweight and scalable video management system that monitors, records, and manages video surveillance of Hanwha cameras while leveraging the power of Wisenet video and audio analytics. Striving to provide customers with additional plugins aligned with their simple, reliable, and customizable solution, Hanwha Vision turned to CyberLink’s AI facial recognition engine, FaceMe®.

With the integration of FaceMe® Security, WiseNet Wave users benefit from leading facial recognition technology, that boasts an impressive accuracy rate of 99.83%, validated by NIST, and iBeta Level 2 certification for anti-spoofing test assurance and compliance. “CyberLink’s Facial recognition plug-in provides our customers with a powerful solution for identification, searching and forensics’ within the WAVE VMS” said Mark Heintzman, manager of technical partnerships in North America.

FaceMe Security’s ability to process video streams for face recognition and face template extraction, and then search and compare to ensure accurate verification, is already enabling Hanwha Vision customers like an expo center and fairgrounds in Pennsylvania.

An 87-acre property, the fairgrounds and expo center sought to install a new surveillance system utilizing over 160 Hanwha Vision cameras. With the goal of preventing admission to blocklisted individuals, while simultaneously having the ability to quickly perform investigations for tracking individuals, such as lost children, Hanwha Vision integrated CyberLink’s FaceMe® Security plugin featuring facial recognition and people tracking, ensuring the safety of visitors to the fairgrounds and expo center.

“CyberLink is excited to integrate with Hanwha Vision, providing their Wisenet WAVE VMS users with access to AI facial recognition,” said Dr. Jau Huang, Chairman and CEO of CyberLink, “We are also looking forward to seeing how additional users integrate the full capabilities of FaceMe® Security, including People Tracker for the enhancement of surveillance capabilities in finding missing or lost people faster, tracking persons of interest and overall security.”    

To learn more about the integration of FaceMe® Security & Hanhwa Wisenet Wave, please visit https://www.cyberlink.com/faceme/solution/security/vms/Hanwha-WAVE

To learn more about the People Tracker, please visit https://www.cyberlink.com/faceme/solution/people-tracker/overview

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Comprehensive backup and recovery for Google Workspace with CloudM Backup

How long would your organization survive after a significant data loss event?

While it’s true that Google is continually upping their security game, striving to ensure your data is as secure as possible, they are fighting against a myriad of old and new evolving threats to your data.

Firstly and simply, we have the insider threat of manual, human deletion of data, either maliciously by an aggrieved employee or accidentally through error. Using preventative measures like role based access and offboarding policies, for example, can limit the threat of data loss, but cannot eliminate it completely. 

Then, there’s external threats to your data from cyber attacks such as malware, phishing and ransomware. For every major security enhancement added to your productivity suite, there are numerous malicious actors looking for weaknesses to exploit. Your data is valuable – and not only to you!

Finally, do you know how you would restore your data in the event of a disaster? Who would do it? How would they do it? How long would it take?

As part of their disaster recovery plan, including a partial or full loss of business data, more organizations are looking to the cloud for a solution. Backing their data to cloud storage to be exact, so their data can easily and quickly be restored, ensuring almost seamless business continuity.

CloudM is excited to introduce our brand new module, comprehensive backup and recovery for Google Workspace, using the perfect blend of the automation and migration technologies that we are known and trusted for.

CloudM Backup is simple to set-up, allowing you to create and assign bespoke backup and data retention policies to your Organizational Units and dynamic CloudM groups (Smart Teams), greatly reducing the time consumed maintaining individual policies.




Once an employee is added to a new policy, our secure and proven migration technology will kick into gear, quickly creating a backup of the user’s Drive and Gmail into Google Cloud Storage. After the initial backup, CloudM Backup will monitor your Google domain, incrementally backing up items whenever a change is detected.

Unlike our competitors, we do not store any of your data. Instead, we back up your data to a Google Storage Cloud bucket completely owned and controlled by you. This means: 

  • CloudM has zero access to your data, increasing your privacy.
  • You can use and move your data as you see fit – it’s not locked in to us or anyone else.
  • Google’s enterprise grade security protects your backed up data.
  • Retention policies can be added so that data is automatically purged ensuring that you stay compliant with data regulations.
  • You pay only for what you store, directly to Google – we don’t add a premium.

Backing up your data is only part one of the process. It’s great to have your data safe in storage, but should the worst happen you need a robust, reliable and quick restoration process. With CloudM Backup, you can easily and intuitively restore data on an individual, team or domain level. 

We also give you the ability to search through all of the data that you have backed up, filtered by each user for speed and convenience. Using this feature, you can view a historic log of all changes made to an item (such as viewing when an email was deleted and when permissions were added to Google Drive files). 

You can also download any version of an item that has been backed up, without the need to trigger a restoration, which is ideal when you only need access to a single item as part of a detailed investigation.

Don’t worry though – you have full control over which users are able to create policies, complete processes and view or download items in CloudM Backup with our role based access permissions. 

Now, back to the question we asked earlier:

With CloudM Backup, your entire business can get back to work in hours (Google have had longer downtimes), keeping the impact of data loss, regardless of the reason, to a minimum.

You can get on with running your organization, safe in the knowledge that CloudM is automatically keeping your data in storage so it is on hand, if and when you need it. CloudM has your back.

Comprehensive backup and recovery for Google Workspace

Find out more and organise your free demo today

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

Crucial Factors to Consider When You’re Buying Data Backup Management Solutions

Valued at USD 4.57 billion in 2023*, the data backup management market is a competitive place that is predicted to grow significantly in the next few years. Whether you’re using Microsoft 365 or Google Workspace, when you start to look for a data backup management solution you will find a host of potential options. In fact, the number of tools available is only going to grow as new providers emerge to carve out their place in the market while established players aim to secure their position. 

With many different solutions available, it can be tricky to choose the right tool for your organization. In recent conversations with prospects and customers, we have seen three recurring themes that can quickly sour your experience.

 

1. Check who owns the data or risk being held to ransom.

 

2. Don’t wait to find out about poor support until you need it.

 

3. Keep up to date with the latest data security practices.

1. Check who owns the data or risk being held to ransom

Once your data, always your data? Think again. Whichever party owns the storage environment ultimately owns the data. While this may not matter while your contract is running, it can be a huge shock should you decide to move to a different provider. 

We have recently had more than a few conversations with prospects who told us they were given the option to renew their contract or lose their data unless they paid an exorbitant fee – in one case 10 times the value of the contract!

Organizations know the value of data and providers of data backup management solutions can be quick to exploit this. When considering different tools, make sure that you keep full control and ownership of your data. If not, you are better off giving the solution a wide berth. 

 

2. Don’t wait to find out about poor support until you need it

Your data is one of your most critical assets. When something goes wrong, you have to be able to rely on getting a speedy response from your solution providers. Subpar support is particularly rife in companies that are growing quickly and where staff turnover is high, so make sure you do your research before committing. 

This can be especially relevant if you are purchasing through a reseller/partner instead of buying directly from the provider. Those among our partners who sell more than one data backup management solution report this as a frequent pain point affecting both themselves and their customers: while the responsibility to resolve the problem sits with the reseller, if they do not get the required support from the provider it is ultimately the customer who suffers the consequences. 

 

3. Leaping ahead or lagging behind?

The recent breakthroughs in generative AI have caused a surge of innovations. Not surprisingly, cyber criminals have been quick to use the power of technological advances for their own motives. With more and more sophisticated attack methods emerging, technology companies have to keep up. This includes all data management companies and particularly those who offer advanced solutions for backup and recovery – two mechanisms that are vital for business resilience and continuity.

Not only should these organizations follow the latest data security practices. Their roadmap can also be a useful indicator of what your experience as their customer may look like: an organization’s roadmap should show the planned and often incremental improvements to their product as well as their larger ambition and appetite for innovation. It may make sense to involve the domain experts in your organization fairly early on in the purchasing process so they have the opportunity to ask critical questions as and when needed. A provider’s product experts and development leads should be aware of market trends, new technologies and emerging threats, so having access to these people can help you make a decision. After all, if data is one of your most valuable assets, you don’t want to trust just anybody with it. 

*Source: Mordor Intelligence

Book a discovery call today!

Would you like to find out more about CloudM and how we can help with your data backup management project?

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

More control and improved insight with the CloudM November product release

On November 15th, we released a number of new features and improvements to the CloudM platform. These provide users with more insights into the health of their projects and systems as well as give them more control and flexibility when it comes to managing data in Google Workspace and Microsoft 365.

 

 

CloudM Backup 1.3: New backup storage option, new offboarding step and improved insights

With the latest Backup 1.3 release, users can now choose to backup their data to AWS as an alternative to Google storage for improved data governance. New audit logs and stats placed prominently within the module give your further insight and control over your systems.

In addition, admins will be better positioned to troubleshoot when things go wrong: should delta backups fail more than 5 times in a row, further delta backups will be put on hold and the status set to “Requires Action”. Users can filter by status, dive into details to understand why the failure occurred and resume the backup once resolved. 

Lastly, a new “Purge Backup” step in our offboarding workflow is particularly useful for customers who use Backup and Archive: leavers data will be moved into Archive while backups will be purged after a customisable period of contingency. Since Archive storage is typically cheaper, this functionality can significantly reduce storage costs.

 

 

CloudM Archive 2.0: More storage regions, new audit logs and better UI

Archive 2.0 is also seeing feature updates that give you more control and insight, such as an expansion of storage regions and a new audit log for user views of the “Restore” section for regulatory, compliance and internal investigative purposes. 

We’ve also made some improvements to the UI so that Archive phases can be better distinguished.

 

 

 

CloudM Automate 2.9.0:  New offboarding step, better visibility of performance and quicker email signature syncs

For customers using our onboarding workflows to reduce the need for manual interference and free up IT admin time, we’re introducing an additional offboarding step that automatically assigns a Google Workspace license to historic users, so that further steps that require a license such as Archive, Migrate Mail and Transfer Ownership can be completed without intervention. As historic users typically still have Google Archive User (AU) or Cloud Identity licenses assigned, offboarding these users can result in significant savings. 

In addition to the new onboarding step, we have also added your offboarding and Archive statistics to the dashboard for better visibility. Lastly, we’ve made manual email signature syncs quicker as they can now be pushed through at Smart Team level rather than the organizational unit (OU).

 

 

 

CloudM Migrate 3.42:  Google Takeout support, seamless migrations

Migrate already has a host of source platforms and we have now added Google Takeout into the mix. To continue the theme of more insight kicked off with our Backup and Archive modules, environment scan now allows you to access historical results. This is particularly useful when making use of another feature we recently added, allowing failed users in environment scans to be re-run. You will now be able to easily access both the original results as well as the retried users.

Note: there is an important update with specific instructions for customers with secondary servers. Find out more here.

For migrations from/to Google Workspace

Making migrations as seamless as possible for end users and admins alike has always been one of our goals, and the 3.42 release adds a few small yet important features to achieve just that: with this release, you will be able to migrate the last 10 messages from your Google Spaces to the new destination so that users can continue working without disruption. 

And good news for those looking to migrate from Google Vault – we have significantly improved throughput speeds and migrations speeds by up to 50%!

For migrations from/to Microsoft 365

Another feature that ensures a smooth experience for end users allows account delegates to be migrated in Microsoft 365 tenant to tenant scenarios. In addition, mail delegation settings can now also be migrated over in M365 to M365 migrations. 

Read the full release notes here.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.