Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

That Barbie Blu-Ray You Rented Could Cost You Your Data

That Barbie Blu-Ray You Rented Could Cost You Your Data

In June, Chicken Soup for the Soul Entertainment—publisher of the eponymous Chicken Soup for the Soul book series—officially filed for Chapter 7 and then Chapter 11 bankruptcy, spurring the liquidation of many of its assets. Many may not realize that these assets include Redbox, the movie rental service, with its 24,000 distinctive scarlet kiosks.

What we’re concerned about, however, is what will become of these kiosks and, critically, the data they contain.

Why Are Redbox Kiosks a Data Risk?

As you likely know, Redbox kiosks were self-service movie rental stations that were once common outside gas stations, pharmacies, and grocery stores. They offered an assortment of DVD and Blu-ray discs for rental. One would sign out a disc and be charged based on how long it was in their possession, depositing it when they were finished using it.

The rise of streaming services would prove to be the end for Redbox, despite the brand’s attempts to embrace the new delivery method through its own application.

However, the famous red boxes of Redbox have not all been removed from their publicly accessible places, leaving many host locations with cumbersome vending machines. Furthermore, hobbyists can get ahold of the old kiosks—one such hobbyist managed to run the video game Doom on one—meaning hackers can get their hands on one, too.

The Problem: These Kiosks Have a Lot of Data in Them

Programmer Foone Turing took it upon herself to crack into a hard drive image (basically, a compressed copy of the hard drive) of an old machine.

By doing so, Turing was able to extract a ton of data, which contained a ton of personally identifiable information. For instance:

  • All email addresses and zip codes that had ever rented a disc
  • The discs each email address had rented, and when
  • Partially hidden credit card numbers (Turing’s example: 1234 56## #### 7890)

So, when you factor in how prevalent these media relics still are today and how easy it is for people to get their hands on kiosks that have been effectively abandoned, the picture is concerning.

The Big-Picture Messages

First and foremost, we all need to be more discerning about sharing our data. We never know how diligent a company is about securing it or even where it is being stored. Let’s face it: Redbox had hard drives with minimal protection sitting in publicly accessible kiosks for years. Who’s to say what another business is doing with the data we provide to them? We must consider how much we share and whether or not it is necessary.

Second, businesses need to meet a certain threshold of cybersecurity these days—not only to maintain trust amongst their customer base, but also to ensure they are protected from various threats that can harm their actual operations.

Voyage Technology can help Western Kentucky businesses with both, taking responsibility for reinforcing proper data handling practices and maintaining the necessary cybersecurity protections. Give us a call at 800.618.9844 to learn more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Mobile Device Hosted Solutions Ransomware Quick Tips Microsoft Small Business Cybersecurity Workplace Strategy Communication Data Backup Smartphone Passwords Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Backup Upgrade Data Recovery Managed Service Managed IT Services Browser Microsoft Office Disaster Recovery Social Media Windows Tech Term Network Internet of Things Remote Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Server Managed Service Provider Miscellaneous Current Events Gadgets Remote Work Productivity Outsourced IT Information Holiday AI Encryption Spam Employee/Employer Relationship Windows 10 Office Compliance Data Management Business Continuity Government Training Windows 10 Bandwidth Blockchain Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol Mobile Device Management Networking Chrome Gmail Budget Apple Vendor App Employer-Employee Relationship Information Technology Avoiding Downtime Conferencing Marketing Office 365 How To BDR WiFi BYOD Applications Access Control Computing Hacker Tip of the week Risk Management Retail Website Healthcare Analytics Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Big Data HIPAA Router Virtual Private Network Health Operating System Help Desk Computers Document Management Remote Workers Telephone Scam Data loss IT Support Firewall Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Solutions Social Display Printer Going Green Paperless Office Windows 11 Infrastructure Customer Service 2FA Monitoring Cybercrime Excel Saving Time Virtual Machines Professional Services Cryptocurrency Wireless Technology Managed IT Service Virtual Desktop Maintenance Data storage Downloads LiFi Antivirus iPhone Word Licensing Outlook Entertainment Vulnerabilities Money Data Privacy Humor Images 101 Multi-Factor Authentication Safety Robot Mobility Telephone System Sports Cost Management Mouse Administration IT Management Meetings VPN Employees Physical Security Integration Modem User Tip Processor Computer Repair Mobile Security Customer Relationship Management Holidays Settings Wireless Printing Content Filtering Data Storage Smart Technology Supply Chain Hacking YouTube Video Conferencing Presentation Machine Learning Managed Services Provider Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace 5G Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity IP Address Google Docs Evernote Paperless Unified Communications Experience Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Bitcoin Running Cable Download Net Neutrality Twitter Alerts SQL Server Technology Care Google Wallet Error History Business Communications Recovery Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Hard Drives Windows 8 Laptop Upload Procurement Remote Computing Azure Hybrid Work Domains Drones Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Tablet IoT Communitications Dark Web Cables Refrigeration Halloween Public Speaking Trends Supply Chain Management Alert File Sharing Regulations Lithium-ion battery Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Entrepreneur Scary Stories Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hacks Fun Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Deep Learning Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Undo Education Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Mobile Computing Search Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Application Best Practice Buisness User Error Microchip Internet Exlporer Software as a Service Fraud Meta IBM Legal IT solutions Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Business Growth Database Surveillance Virtual Assistant Outsource IT Media Cortana Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Alt Codes Proxy Server Reviews Downtime Tactics Development Hotspot Transportation Small Businesses Competition Hosted Solution Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Typing Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Drive Navigation User Knowledge Management PCI DSS Chatbots

Blog Archive