Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

The breach in question happened on January 7th, 2016, and it’s estimated that up to 320,000 Time Warner Cable customers could have had their email addresses and passwords stolen. The cable company was notified by the FBI of the data theft, and Time Warner Cable proceeded to notify its affected users of the situation, both through email and direct mail. Time Warner Cable, however, vehemently declares that their systems failed to exhibit signs of a data breach.

This is hardly the first time that a major ISP’s information was breached or stolen by scammers. Just last November, Comcast had to reset the passwords of nearly 200,000 customers that were found on the black market. In this case, the incident was blamed on phishing attacks that coerced users into handing over their credentials, but what happened with Time Warner Cable isn’t so clear.

Time Warner Cable suggests that the theft occurred thanks to potential phishing attempts directed at the company, or it was the result of a data breach at other companies storing Time Warner Cable customer credentials. Either way, the fact remains that Time Warner Cable suffered a data theft, and is now paying for it with the stigma associated with lost credentials, and frustrated or simply worried customers.

As a business owner, you need to ask yourself if your organization can handle losing this much face, and more importantly, the financial burdens of allowing data breaches to happen. Most businesses that lose data due to data breaches, and aren’t able to recover quickly, go out of business within one year of the incident. That’s not to mention the fines of personal or sensitive information being stolen or compromised. If this happens, you can expect some nasty compliance fees that could break both your budget and your operations. This is why it’s a best practice to take preventative measures to keep hackers out of your network in the first place.

In general, it’s a good idea to change your passwords every now and then, especially if they’re still the default password that hasn’t been changed in several months or even years. Your passwords should always be long and complex, with both upper and lower-case letters, numbers, and symbols. Of course, these tips won’t help you much if your password gets sold on the black market, but it will keep the average hacker from cracking your password through brute force alone.

A password manager is a great way to keep your business’s credentials safe, without compromising security. The password manager stores your company’s credentials in a secure location and calls them only when you need them. It’s great for maintaining security while being able to remember your passwords.

For more information, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 29 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones AI VoIP Business Management Data Recovery Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Information Automation Facebook Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Virtualization Apps Data Security Vendor Mobile Office Two-factor Authentication Chrome Networking Employer-Employee Relationship Budget Apple BYOD App Mobile Device Management Managed Services Voice over Internet Protocol Gmail Tip of the week How To BDR Hacker HIPAA Avoiding Downtime Applications Marketing Access Control Computing Information Technology Conferencing WiFi Office 365 Office Tips Analytics Augmented Reality Managed IT Services Storage Password Bring Your Own Device Computers Router Website Virtual Private Network Operating System Health Help Desk Healthcare Risk Management 2FA Retail Big Data Scam Social Windows 7 Data loss Microsoft 365 Cooperation Solutions Customer Service Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Going Green Display Printer Paperless Office Cybercrime Infrastructure Monitoring Firewall Remote Workers Windows 11 Document Management The Internet of Things Excel Free Resource Project Management Telephone Images 101 Outlook Licensing Multi-Factor Authentication Mobility Money Entertainment Humor Customer Relationship Management Sports Robot Mouse Data Privacy Employees Telephone System Hacking Cost Management Integration Presentation Administration Wireless Technology IT Management Meetings Holidays VPN Data Storage User Tip Modem Settings Processor Video Conferencing Computer Repair Mobile Security Managed Services Provider Printing Wireless Word Content Filtering Virtual Machines Professional Services YouTube Smart Technology Cryptocurrency Machine Learning Saving Time iPhone Safety Supply Chain Virtual Desktop Vulnerabilities Data storage Managed IT Service LiFi Maintenance Downloads Antivirus Browsers Paperless Application IT Assessment Connectivity Social Engineering Break Fix Halloween Co-managed IT Flexibility Upload Remote Computing Value Multi-Factor Security Technology Care IBM Organization Social Network Digital Security Cameras Business Communications Tablet Smart Devices IoT Dark Web Hacks Scary Stories Scams Remote Working Trends Alert Memory File Sharing Data Breach Regulations Dark Data Google Play Google Calendar Hybrid Work Managed IT Fun Customer Resource management Videos Data Analysis Human Resources Electronic Health Records Star Wars How To Microsoft Excel Deep Learning Cables Competition Gamification Notifications Wasting Time Staff Travel Trend Micro Social Networking Security Cameras Legislation Education Techology Fileless Malware Google Apps Google Maps Software as a Service Mobile Computing IT Maintenance Content Managing Costs Wearable Technology Health IT User Unified Threat Management eCommerce Motherboard SSID Comparison Business Intelligence Search Unified Threat Management Directions Shortcuts Surveillance Assessment Virtual Assistant Permissions Best Practice Buisness Ransmoware Virtual Machine Network Congestion Medical IT Legal Specifications IT solutions Vendors IP Address Reviews User Error Microchip Be Proactive Development Internet Exlporer Transportation Fraud Business Growth Workforce Username Hypervisor Shopping Recovery Point of Sale Optimization PowerPoint Black Friday Threats Cortana Alt Codes Workplace Strategies Hard Drives Database Employer/Employee Relationships IT Technicians Navigation Downtime Meta Domains Network Management PCI DSS Tech Support Gig Economy Proxy Server Cookies Monitors Cyber Monday Hosted Solution Amazon Typing Refrigeration Internet Service Provider Tactics Teamwork Hotspot Mirgation Evernote Outsource IT Public Speaking Regulations Compliance Websites Knowledge Media Memes Nanotechnology Google Drive Environment Lithium-ion battery SharePoint Net Neutrality Addiction Entrepreneur Electronic Medical Records SQL Server Language History Chatbots Small Businesses 5G Financial Data Management Lenovo Experience Smartwatch IT Screen Reader Writing Google Docs Distributed Denial of Service Unified Communications Displays Bitcoin Running Cable Undo Procurement Service Level Agreement Virtual Reality Azure Computing Infrastructure Private Cloud Cyber security Identity Tech Google Wallet Outsourcing Server Management Telework Superfish CES Bookmark Identity Theft Communitications Smart Tech Windows 8 Laptop Workplace Supply Chain Management Download Twitter Alerts Error Term Drones Hiring/Firing FinTech

Blog Archive