In June of this year, publisher Chicken Soup for the Soul Entertainment, best known for its book series of the same name, filed for Chapter 7 and Chapter 11 bankruptcy and had many of its assets liquidated. One of these assets was the movie rental service Redbox and its eponymous scarlet rental kiosks, rendering the service defunct.
However, many kiosks remain standing outside businesses even now, which makes us wonder… what about all the data they collected while they were in use?
You’re likely familiar with Redbox, with at least knowledge of them if not first-hand experience. These kiosks were once commonly found at gas stations, grocery stores, pharmacies, and other public places, and allowed customers to rent DVDs and Blu-ray discs. All one had to do was provide a credit card to sign out a movie, and the service would charge them per day until it was deposited back into one of these kiosks.
While Redbox would attempt to follow other content services into streaming as the new delivery method became widespread, these developments ultimately left the business in the past.
However, many red kiosks remain “in the wild” even now, burdening some businesses that hosted the service with clunky machines that serve no purpose. Some hobbyists have taken on the kiosks, entertaining themselves by tinkering with them. One such hobbyist enabled the Doom video game to play on one of them.
This is all in good fun… but what if we swap out the hobbyist for a hacker?
Foone Turing, a programmer, used a hard drive image (which is effectively a compressed copy of a hard drive) to look into a kiosk's inner workings.
What she found was not good.
Turing pulled a ton of data—including a lot of personally identifiable information—from the image. This data included:
So, if you think about your nearest Redbox—perhaps one you used yourself—and how easy it would be to obtain that kiosk from a business that just wants to get rid of it, it should make you worry a little.
First, we all need to be more aware of what data we share and with whom. The unfortunate truth is that we have no guarantee of how secure a company is keeping its data or where it is stored. Redbox had this data sitting in minimally protected hard drives, just hanging out in public places. There’s no guarantee that any other business is being more diligent. We must strictly evaluate what we share with businesses and whether doing so is necessary.
Second, there is a cybersecurity threshold that businesses need to meet to maintain the trust of their clientele and protect themselves and their operations from impending threats.
At Jackson Thornton Technologies, we help Southeastern US businesses accomplish both, ensuring that they maintain proper data handling and are sufficiently secured against threats. Call (877) 226-9091 to learn more about how we can help you.
Comments