Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

That Barbie Blu-Ray You Rented Could Cost You Your Data

That Barbie Blu-Ray You Rented Could Cost You Your Data

In June, Chicken Soup for the Soul Entertainment—publisher of the eponymous Chicken Soup for the Soul book series—officially filed for Chapter 7 and then Chapter 11 bankruptcy, spurring the liquidation of many of its assets. Many may not realize that these assets include Redbox, the movie rental service, with its 24,000 distinctive scarlet kiosks.

What we’re concerned about, however, is what will become of these kiosks and, critically, the data they contain.

Why Are Redbox Kiosks a Data Risk?

As you likely know, Redbox kiosks were self-service movie rental stations that were once common outside gas stations, pharmacies, and grocery stores. They offered an assortment of DVD and Blu-ray discs for rental. One would sign out a disc and be charged based on how long it was in their possession, depositing it when they were finished using it.

The rise of streaming services would prove to be the end for Redbox, despite the brand’s attempts to embrace the new delivery method through its own application.

However, the famous red boxes of Redbox have not all been removed from their publicly accessible places, leaving many host locations with cumbersome vending machines. Furthermore, hobbyists can get ahold of the old kiosks—one such hobbyist managed to run the video game Doom on one—meaning hackers can get their hands on one, too.

The Problem: These Kiosks Have a Lot of Data in Them

Programmer Foone Turing took it upon herself to crack into a hard drive image (basically, a compressed copy of the hard drive) of an old machine.

By doing so, Turing was able to extract a ton of data, which contained a ton of personally identifiable information. For instance:

  • All email addresses and zip codes that had ever rented a disc
  • The discs each email address had rented, and when
  • Partially hidden credit card numbers (Turing’s example: 1234 56## #### 7890)

So, when you factor in how prevalent these media relics still are today and how easy it is for people to get their hands on kiosks that have been effectively abandoned, the picture is concerning.

The Big-Picture Messages

First and foremost, we all need to be more discerning about sharing our data. We never know how diligent a company is about securing it or even where it is being stored. Let’s face it: Redbox had hard drives with minimal protection sitting in publicly accessible kiosks for years. Who’s to say what another business is doing with the data we provide to them? We must consider how much we share and whether or not it is necessary.

Second, businesses need to meet a certain threshold of cybersecurity these days—not only to maintain trust amongst their customer base, but also to ensure they are protected from various threats that can harm their actual operations.

Voyage Technology can help Western Kentucky businesses with both, taking responsibility for reinforcing proper data handling practices and maintaining the necessary cybersecurity protections. Give us a call at 800.618.9844 to learn more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Vendor Data Security Apps Two-factor Authentication Managed Services Mobile Office App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To HIPAA BDR Applications Computing Physical Security Hacker Information Technology Avoiding Downtime Conferencing Marketing Access Control Office 365 Managed IT Services Router Operating System 2FA Computers Help Desk Virtual Private Network Risk Management Website Health Healthcare Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Solutions Social Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Windows 11 Cybercrime Monitoring Display Excel Printer Paperless Office Infrastructure Remote Workers Managed IT Service Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Employees Integration Robot User Tip Modem Customer Relationship Management Mobile Security Settings Processor Printing Wireless Content Filtering Holidays Hacking IT Management Data Storage Presentation VPN YouTube Meetings Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Wireless Technology Computer Repair Saving Time Virtual Machines Professional Services Virtual Desktop LiFi Data storage Downloads Word Outlook iPhone Licensing Machine Learning Money Entertainment Humor Vulnerabilities Data Privacy Maintenance Images 101 Safety Antivirus Sports Telephone System Multi-Factor Authentication Mouse Mobility Cost Management Administration Permissions Workforce Application Best Practice Alert Directions Videos Assessment Electronic Health Records Wasting Time Threats Managed IT Buisness File Sharing Dark Data How To Trend Micro IBM Legal Specifications Security Cameras Workplace Strategies IT solutions Fraud Meta Business Growth Notifications Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Travel Cortana eCommerce Techology Black Friday SSID Google Maps Virtual Assistant Outsource IT Alt Codes Database Surveillance IT Technicians Virtual Machine Environment Competition Media Downtime Unified Threat Management Hosted Solution Proxy Server Reviews Cookies Unified Threat Management Cyber Monday Medical IT Hotspot Transportation Small Businesses Typing Tactics Development Network Congestion Mirgation Hypervisor Displays User Knowledge Shopping Nanotechnology Optimization Google Drive User Error PowerPoint Language Employer/Employee Relationships Outsourcing Addiction 5G Management PCI DSS Chatbots Navigation Point of Sale Unified Communications Experience Gig Economy Screen Reader IP Address Google Docs Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Monitors Regulations Compliance Identity Google Wallet Evernote Paperless Recovery Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Hard Drives Windows 8 Laptop Websites Download Net Neutrality Financial Data History Domains Drones Business Communications Electronic Medical Records Browsers Smartwatch Connectivity IT SharePoint Break Fix Scams Azure Hybrid Work Refrigeration Halloween Upload Procurement Writing Social Network Telework Cyber security Public Speaking Lenovo Multi-Factor Security Tech Human Resources Virtual Reality CES IoT Communitications Lithium-ion battery Dark Web Cables Hacks Server Management Entrepreneur Scary Stories Private Cloud Trends Supply Chain Management Fun Customer Resource management FinTech Regulations Superfish Google Calendar Term Google Apps Identity Theft Deep Learning Twitter Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Undo Error Gamification Flexibility Social Engineering Organization Social Networking Legislation Shortcuts Education Remote Computing Fileless Malware Digital Security Cameras Smart Devices Ransmoware Content Remote Working Wearable Technology Memory Vendors Mobile Computing Search Health IT Motherboard Data Breach Comparison Google Play Be Proactive Tablet

Blog Archive