Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Dealing with Major Data Leak

Microsoft Dealing with Major Data Leak

Incorrect configurations on your infrastructure’s hardware are surprisingly easy mistakes to make, and even worse, they can have severe security ramifications if they are not discovered promptly. It can happen to anyone, as evidenced by a recent data leak. One of the most popular software developers out there, Microsoft, made a pretty nasty blunder with one particular setting that led to a huge data leak that could have exposed millions of records.

This data leak affected users of Microsoft’s Power Apps, which is a software used by many companies and organizations to share data. Power Apps is used by big-name organizations and agencies like American Airlines, Maryland’s health department, and New York’s Metropolitan Transport Authority. This data leak was discovered by cybersecurity researchers at UpGuard. After identifying that the data leak was a potential security issue, UpGuard notified Microsoft about it.

Thankfully, the issue was promptly resolved, but while the data leak was active, sensitive information like names, Social Security numbers, phone numbers, dates of birth, vaccination records, demographic information, and more was left unsecured. While there is no indication that this information was accessed in any improper way, the fact remains that it was unsecured for an extended period of time and, therefore, vulnerable to attack.

The most unbelievable part of this whole issue is that Microsoft claims that the application was working as intended, which means that the default settings for the software were configured in such a way that this private or sensitive data were unsecured. Microsoft has adjusted the default settings so that there is greater privacy, but they have yet to comment on why it was such a problem in the first place.

You can never be too careful when it comes to your business’ sensitive information, as even the solutions that you believe are properly secured could eventually create a data leak if improperly configured. A security audit might be an effective way to identify these issues, but the fact of the matter is that nobody will find a leak they are not actively looking for, hence why this particular leak occurred and went undetected for so long. People simply had no reason to look for it at first.

Voyage Technology wants to help your business ensure that all of the tools you use are not putting your sensitive information at odds or at risk. We can monitor your network for inconsistencies and make sure your solutions are properly configured right from the implementation step.

To learn more, contact us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Smartphone Data Backup Data Recovery AI Android Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps Apple Networking App Mobile Device Management BYOD Gmail WiFi Tip of the week Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Avoiding Downtime How To BDR Marketing HIPAA Computing Applications Information Technology Access Control Office 365 Conferencing Hacker Managed IT Services Website 2FA Operating System Router Virtual Private Network Risk Management Health Big Data Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Computers Bring Your Own Device Cooperation Free Resource Project Management Windows 7 Windows 11 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Excel Vulnerability Vendor Management Solutions Firewall Cybercrime Physical Security Display The Internet of Things Printer Paperless Office Infrastructure Monitoring Social Document Management Remote Workers Customer Service Telephone Scam Data loss Administration Vulnerabilities Wireless Technology Entertainment Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Supply Chain Word Settings Wireless Printing Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency Safety User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Data storage Data Privacy Data Storage Smart Technology Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Customer Relationship Management Managed IT Service Maintenance Downloads Hacking Antivirus Sports iPhone Presentation Mouse Licensing Multi-Factor Security Tech Amazon Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web CES Outsource IT Best Practice Trends Supply Chain Management Alert IP Address Dark Data Google Calendar Term Environment Media Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Legal Data Analysis Small Businesses Recovery Business Growth Gamification Flexibility Notifications Staff Value Legislation Displays Hard Drives Organization Travel Social Networking Google Maps Smart Devices Cortana Domains Techology Fileless Malware Digital Security Cameras Outsourcing Alt Codes Content Remote Working Wearable Technology Memory Comparison Google Play Refrigeration Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Public Speaking Workplace Unified Threat Management Directions Videos Hiring/Firing Typing Wasting Time Lithium-ion battery Network Congestion Specifications Security Cameras Paperless Entrepreneur Trend Micro Internet Exlporer Software as a Service Knowledge Fraud Co-managed IT Google Drive User Error Microchip Technology Care Username Managing Costs 5G Black Friday SSID Undo Business Communications Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant Scams Google Docs Hybrid Work Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Human Resources Google Wallet Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Cables Application Windows 8 Laptop Websites Mirgation Hypervisor PowerPoint Google Apps Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships IBM IT Maintenance SharePoint Business Intelligence Management PCI DSS Halloween Chatbots Navigation Writing Distributed Denial of Service Shortcuts Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Ransmoware Vendors Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Identity Theft Smart Tech Memes Fun Competition Be Proactive Superfish Bookmark Deep Learning Download Net Neutrality Twitter Alerts SQL Server Workforce Threats Financial Data Error History Education Connectivity IT Social Engineering Break Fix Workplace Strategies Browsers Smartwatch User Upload Procurement Remote Computing Azure Meta

Blog Archive