Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

The breach in question happened on January 7th, 2016, and it’s estimated that up to 320,000 Time Warner Cable customers could have had their email addresses and passwords stolen. The cable company was notified by the FBI of the data theft, and Time Warner Cable proceeded to notify its affected users of the situation, both through email and direct mail. Time Warner Cable, however, vehemently declares that their systems failed to exhibit signs of a data breach.

This is hardly the first time that a major ISP’s information was breached or stolen by scammers. Just last November, Comcast had to reset the passwords of nearly 200,000 customers that were found on the black market. In this case, the incident was blamed on phishing attacks that coerced users into handing over their credentials, but what happened with Time Warner Cable isn’t so clear.

Time Warner Cable suggests that the theft occurred thanks to potential phishing attempts directed at the company, or it was the result of a data breach at other companies storing Time Warner Cable customer credentials. Either way, the fact remains that Time Warner Cable suffered a data theft, and is now paying for it with the stigma associated with lost credentials, and frustrated or simply worried customers.

As a business owner, you need to ask yourself if your organization can handle losing this much face, and more importantly, the financial burdens of allowing data breaches to happen. Most businesses that lose data due to data breaches, and aren’t able to recover quickly, go out of business within one year of the incident. That’s not to mention the fines of personal or sensitive information being stolen or compromised. If this happens, you can expect some nasty compliance fees that could break both your budget and your operations. This is why it’s a best practice to take preventative measures to keep hackers out of your network in the first place.

In general, it’s a good idea to change your passwords every now and then, especially if they’re still the default password that hasn’t been changed in several months or even years. Your passwords should always be long and complex, with both upper and lower-case letters, numbers, and symbols. Of course, these tips won’t help you much if your password gets sold on the black market, but it will keep the average hacker from cracking your password through brute force alone.

A password manager is a great way to keep your business’s credentials safe, without compromising security. The password manager stores your company’s credentials in a secure location and calls them only when you need them. It’s great for maintaining security while being able to remember your passwords.

For more information, give us a call at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Windows 10 Computer Managed Service Provider Data Backup Productivity Ransomware Backup Innovation Mobile Devices Business Continuity Outsourced IT Android Hardware Smartphone Google Disaster Recovery Managed IT services Upgrade Social Media Efficiency User Tips Data Recovery Browser Communication IT Support Workplace Tips Data Small Business Cloud Computing IT Support Managed IT Services Business Management Smartphones App Data Management Phishing Holiday Microsoft Office Server Office Remote Monitoring Internet of Things Miscellaneous Facebook WiFi communications Network Paperless Office Office 365 Password Windows Apps Passwords Encryption Cybersecurity Save Money Artificial Intelligence VoIP Tech Term Gmail Big Data Spam Windows 10 Unified Threat Management Document Management Hosted Solution Recovery Apple Robot Employer-Employee Relationship Risk Management Saving Money Collaboration Bandwidth Firewall Customer Relationship Management Content Filtering Chrome Tip of the week Downtime Wi-Fi Avoiding Downtime Office Tips How To Government Customer Service Mobile Device Management Money Analytics Operating System Work/Life Balance Remote Computing Word Hacker Compliance Managed IT Infrastructure Vendor Management Going Green Telephone Systems Alert Applications Printing Data storage Social Windows 7 Health Computing Website Vulnerability Hacking Help Desk Mobile Computing Virtual Reality Data Security Training Tech Support Two-factor Authentication SaaS Settings BYOD IT Management The Internet of Things Computers Mobile Device Antivirus Business Growth Redundancy Presentation Healthcare Project Management Data loss File Sharing BDR Managed Service Education Business Technology Outlook Cybercrime Automation Physical Security Net Neutrality Taxes Proactive IT solutions Smart Technology Safety Retail Botnet Wireless Technology Remote Monitoring and Management Best Practice Samsung HIPAA Software as a Service Patch Management Wireless Lithium-ion battery Solid State Drive Router Mobile Security Scam Business Owner Meetings Identity Theft Storage Marketing Computer Care YouTube Unified Communications VPN Assessment Server Management Competition Licensing LiFi Virtual Private Network Digital Payment Access Control Consultation Information Technology Upgrades Maintenance Automobile Budget Humor End of Support Augmented Reality Laptops Analyitcs Mouse IBM Running Cable Tablet Legal Display Bring Your Own Device Search Specifications Twitter Sports IT service Politics Regulations Monitors Cortana Travel Google Drive Virtualization Administration User Websites Recycling Batteries Typing Lenovo Digital Motion Sickness Tracking Wearable Technology Bookmarks Google Docs Unified Threat Management Buisness Shortcut iPhone Uninterrupted Power Supply Motherboard Voice over Internet Protocol Writing Management Remote Work Personal Information Cryptocurrency Internet Exlporer Superfish Knowledge Spyware IT Consultant Favorites business communications systems Distributed Denial of Service Machine Learning Social Engineering Enterprise Resource Planning File Management Computer Repair Bitcoin Experience data services How To Cleaning WPA3 Notifications IT Technicians Conferencing Internet Protocol Technology Tips Heating/Cooling Managed IT Service Hard Disk Drive Relocation Modem Manufacturing Mobile Telephone Electronic Medical Records Windows 8 Hotspot Google Wallet Networking User Error Firefox Webcam Supercomputer Servers Domains Fleet Tracking PowerPoint Crowdsourcing Mirgation Employees Dark Data VoIP streamlines Comparison Break Fix 5G Entrepreneur Private Cloud Cookies Gadgets IT Budget Company Culture Mobile VoIP Language Drones Printer Application Consumers Point of Sale Public Speaking Asset Tracking Migration Zero-Day Threat business network infrastructure Users Black Friday Dark Web Error Nanotechnology Proactive Maintenance Vulnerabilities Computing Infrastructure Techology Statistics eWaste Software Tips Remote Workers Chatbots Backup and Disaster Recovery Cyber Monday Data Warehousing Mail Merge IoT Processor IT Sevices Web Server Geography Update Alerts Disaster Resistance Laptop SharePoint Hard Drives Bluetooth Environment Information Identity RMM Virtual Desktop flu season 3D Printing Microsoft Excel Address Corporate Profile Administrator Utility Computing Cameras Cables Chromebook Cooperation Proactive IT Halloween Downloads Quick Tips Refrigeration Troubleshooting History Monitoring Law Enforcement Procurement Network Congestion Fort Worth Active Directory Unsupported Software Deep Learning Blockchain Fun WannaCry CCTV Wires Emoji Staff IT Consulting Scary Stories Multi-Factor Security Time Management Mobility Cabling Electronic Health Records Phone System Gadget Remote Worker flu shot Cost Management Windows Server Mobile Data Permissions Hacks Staffing Flexibility Data Breach Google Calendar Network Management Undo Fort Worth IT IP Address Professional Services Hard Drive User Management Alt Codes Fraud Current Events VoIP GPS G Suite Google Maps MSP Processors Operations Cyberattacks Technology Laws Legislation Touchscreen DFW IT Service Mobile Office Disaster Social Networking Virtual Assistant

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code