Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

The breach in question happened on January 7th, 2016, and it’s estimated that up to 320,000 Time Warner Cable customers could have had their email addresses and passwords stolen. The cable company was notified by the FBI of the data theft, and Time Warner Cable proceeded to notify its affected users of the situation, both through email and direct mail. Time Warner Cable, however, vehemently declares that their systems failed to exhibit signs of a data breach.

This is hardly the first time that a major ISP’s information was breached or stolen by scammers. Just last November, Comcast had to reset the passwords of nearly 200,000 customers that were found on the black market. In this case, the incident was blamed on phishing attacks that coerced users into handing over their credentials, but what happened with Time Warner Cable isn’t so clear.

Time Warner Cable suggests that the theft occurred thanks to potential phishing attempts directed at the company, or it was the result of a data breach at other companies storing Time Warner Cable customer credentials. Either way, the fact remains that Time Warner Cable suffered a data theft, and is now paying for it with the stigma associated with lost credentials, and frustrated or simply worried customers.

As a business owner, you need to ask yourself if your organization can handle losing this much face, and more importantly, the financial burdens of allowing data breaches to happen. Most businesses that lose data due to data breaches, and aren’t able to recover quickly, go out of business within one year of the incident. That’s not to mention the fines of personal or sensitive information being stolen or compromised. If this happens, you can expect some nasty compliance fees that could break both your budget and your operations. This is why it’s a best practice to take preventative measures to keep hackers out of your network in the first place.

In general, it’s a good idea to change your passwords every now and then, especially if they’re still the default password that hasn’t been changed in several months or even years. Your passwords should always be long and complex, with both upper and lower-case letters, numbers, and symbols. Of course, these tips won’t help you much if your password gets sold on the black market, but it will keep the average hacker from cracking your password through brute force alone.

A password manager is a great way to keep your business’s credentials safe, without compromising security. The password manager stores your company’s credentials in a secure location and calls them only when you need them. It’s great for maintaining security while being able to remember your passwords.

For more information, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 May 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Efficiency Email Privacy Google Workplace Tips Computer Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Data Backup Microsoft Workplace Strategy Communication Small Business Mobile Device Smartphones Mobile Devices communications Android Saving Money Smartphone Business Management VoIP Managed Service Managed IT Services Microsoft Office Data Recovery Browser Social Media Passwords Upgrade Backup Disaster Recovery Network Tech Term Internet of Things Automation Artificial Intelligence Cloud Computing Covid-19 Remote Remote Work Server Managed Service Provider Windows Outsourced IT Facebook Miscellaneous Information Spam Encryption Gadgets Holiday Employee/Employer Relationship Windows 10 Business Continuity Data Management Government Wi-Fi Productivity Business Technology Windows 10 Current Events Blockchain Apps Two-factor Authentication Bandwidth Compliance Data Security Virtualization Employer-Employee Relationship Vendor Office Mobile Office Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking App Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Conferencing How To BDR AI Operating System BYOD HIPAA Router Risk Management Virtual Private Network Training Computers Health Help Desk Analytics Website Office Tips Marketing Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services WiFi Big Data Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Monitoring Windows 11 IT Support Tip of the week Document Management Excel Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Employees Integration Cryptocurrency Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing 2FA Supply Chain Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Managed IT Service Maintenance Downloads Antivirus Sports Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Images 101 Data Privacy Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Unified Threat Management Directions Videos Vendors Hosted Solution Assessment Electronic Health Records Permissions Typing Be Proactive Wasting Time Workforce Trend Micro Network Congestion Specifications Security Cameras Google Drive User Error Microchip Threats Internet Exlporer Software as a Service Competition Knowledge Physical Security Fraud Username Workplace Strategies Managing Costs Meta Point of Sale eCommerce 5G Black Friday SSID Google Docs Amazon Unified Communications Database Surveillance Experience Virtual Assistant Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Outsource IT Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Environment Tactics Development Media Hotspot Transportation Windows 8 IP Address Laptop Websites Mirgation Hypervisor Small Businesses Nanotechnology Optimization PowerPoint Drones Shopping SharePoint Displays Addiction Electronic Medical Records Language Employer/Employee Relationships Recovery Navigation Management PCI DSS Halloween Chatbots Outsourcing Screen Reader Hard Drives Writing Distributed Denial of Service Lenovo Gig Economy Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Evernote Hacks Server Management Regulations Compliance Workplace Scary Stories Private Cloud Identity Hiring/Firing Identity Theft Smart Tech Memes Refrigeration Fun Superfish Bookmark Deep Learning Download Net Neutrality Public Speaking Paperless Twitter Alerts SQL Server Financial Data Lithium-ion battery Co-managed IT Error History Browsers Smartwatch Technology Care Education Connectivity IT Social Engineering Break Fix Entrepreneur Upload Procurement Business Communications Remote Computing Azure Scams Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework CES Hybrid Work Tablet IoT Communitications Undo Search Dark Web Best Practice Trends Supply Chain Management Human Resources Alert Cables Buisness File Sharing Regulations Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Business Growth Gamification Flexibility Google Apps Notifications Staff Value IT Maintenance Travel Social Networking Application Legislation Organization Techology Fileless Malware Digital Security Cameras Business Intelligence Google Maps Smart Devices Cortana Alt Codes Content Remote Working IBM Shortcuts Wearable Technology Memory Ransmoware Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Health IT

Blog Archive