Oops: Microsoft Site Exposes Sensitive Data
Oops: Microsoft Site Exposes Sensitive Data

Those who use the Office 365 platform are certainly familiar with Docs.com, a Microsoft platform for public document sharing. However, guess what is the weirdest thing about this service, unlike other services, in this service all the information available is public (by default).

Oops: Microsoft Site Exposes Sensitive Data

“Docs.com” it is a Microsoft document storage service, except that, unlike other services, all the information available is public (by default). Thousands of users are unaware of this feature and share everything over there such as passwords, citizen cards, bank transfers details, and much more confidential data.

Those who use the Office 365 platform are certainly familiar with Docs.com, a Microsoft platform for public document sharing. This means that if the user places information on this platform and does not change the permissions, the whole world will be able to access those documents. Thousands of users have been sharing information on this platform, but they do not know how the service works (that is, everything they enter over there, it remains public by default).

To “make life easier” for those seeking confidential information, the service provides a search engine and multiple filters. After being alerted to the presence of sensitive public information, the tech giant Microsoft removed the function last Sunday but has already restarted.

The information provided on this platform belongs to users worldwide but filtering through few countries like India we can prove that there are many personal documents ranging from citizen cards, proof of payment, bank transfers, etc. So, if you use this platform, then simply recheck or validate that you do not have sensitive information shared with the world.

So, what do you think about this? Simply share your views and thoughts in the comment section below.



AUTHOR

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.