facebook linkedin twitter

Computerware Blog

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

Lesson One: Don’t Reuse Your Passwords

Here’s the deal—hackers were able to access 350,000 accounts on Spotify’s systems without having to attack the streaming service at all. Instead, these hackers used login credentials that other data breaches had exposed on other sites and services.

Basically, the hackers took the credentials that had been taken from other breached websites and tried them out on Spotify to see what worked. This practice, known as credential stuffing, is a common and simple one for attackers to use.

Of course, while having any password breached isn’t a good thing, it can really become a problem if a user has reused that combination of credentials on multiple platforms. That’s why it is considered an essential best practice to always have a unique password for each account—especially any work-related or financial accounts—you use, saved in an encrypted password management tool if necessary.

Lesson Two: Make Sure Your Data is Secured

In a roundabout way, the people responsible for this breach can teach us another important lesson in data security—namely, the importance of properly securing the data that is collected.

This security issue was discovered when two researchers were scanning the Internet for unsecured data. The hackers had shortsightedly saved their stolen credentials on an unsecured cloud database, where anyone could presumably access them… no password required. As a result, other cybercriminals could have easily found the data as well and copied it for their own purposes.

While we’re happy that this data was found, it does shine a light on how important it is to keep your data secured and private. After all, Spotify has since prompted a password reset for affected users and rendered this data obsolete… at least, obsolete on the streaming platform. If the hackers had stored this data a little more securely, this data would still be that much more accurate.

You should learn from their example and take steps now to ensure that your data is good and properly secured.

Computerware can help you put both important lessons into practice. Reach out to us today to learn more about your data security and what you can do to help protect your assets without sacrificing productivity. Give us a call at (703) 821-8200 today.

Holiday Shopping Looking Different this Year
Update Google Chrome, Says Homeland Security
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 23, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Software Internet Cloud Data Hackers Business Management Workplace Tips Hardware Network Security Microsoft Productivity Backup Business Email Managed Service Provider Hosted Solutions Productivity IT Services Efficiency Saving Money Malware Google Innovation Small Business Collaboration User Tips Computer IT Support VoIP Quick Tips Data Backup Smartphones Network IT Support Data Recovery Mobile Devices communications Android Microsoft Office Business Continuity Gadgets Disaster Recovery Communication Smartphone Cybersecurity Phishing Social Media Upgrade Mobile Office Server Virtualization Mobile Device Miscellaneous Mobile Device Management Windows Ransomware Users Passwords Managed IT Services Holiday BDR Vendor Management Operating System Tech Term Outsourced IT Internet of Things Windows 10 Apps Unified Threat Management Automation Remote Monitoring Facebook BYOD Apple Mobile Computing Analytics WiFi Covid-19 Data Management Managed IT services Remote Computing Windows 10 Cloud Computing Marketing Browser Managed Service Spam The Internet of Things Save Money Training Help Desk History Artificial Intelligence Business Technology Firewall Big data Bandwidth Health Encryption Alert App Two-factor Authentication Information Technology IT Consultant Office 365 Office Budget Access Control Gmail Content Filtering Windows 7 Going Green Government Maintenance Wi-Fi Blockchain Cybercrime Printer Hard Drives Bring Your Own Device Managed IT Antivirus Information VPN Networking Windows 8 Outlook Lithium-ion Battery Best Practice Recovery Employer-Employee Relationship Tech Support Retail Virus Document Management Hiring/Firing Remote Work Wireless Technology Cost Management Saving Time Computers Search Healthcare Update iPhone Customer Service Risk Management It Management Storage Data Security Humor IBM Computing Conferencing Patch Management Money Data Loss Augmented Reality Hacking Project Management Phone System Vendor Travel Avoiding Downtime Education Wireless Regulations Meetings Applications Website Save Time Voice over Internet Protocol SaaS Customer Relationship Management End of Support Router Downtime PowerPoint Law Enforcement Password Value Solid State Drive Proactive IT Compliance Computer Repair Running Cable Data Breach Hacker Data storage Administration File Sharing Flexibility Current Events Hard Drive Intranet Laptop Twitter Remote Mobility Legal Social Fax Server Employees Paperless Office Net Neutrality DDoS Chrome Excel Private Cloud Sports Business Intelligence Disaster Digital Payment Telephony Hosted Solution Machine Learning Robot Word Securty Comparison Tablet Scam Telephone Systems Monitoring Cortana Company Culture Employee/Employer Relationship Social Networking Management Black Market Cooperation Digital Cryptocurrency Websites Vulnerabilities Google Maps User Business Growth Social Engineering Software as a Service Virtual Desktop Chromebook Office Tips Uninterrupted Power Supply Solutions Video Conferencing Professional Services Vulnerability eCommerce Lifestyle Pain Points Documents Computing Infrastructure Hack Bitcoin Entertainment How To YouTube Teamwork Heating/Cooling Download Unified Communications Settings Data Protection Integration Distribution Holidays Downloads Microchip Taxes Computer Accessories Time Management Managed Services Provider Cost Display Gaming Console eWaste Distributed Denial of Service IT service Trending Redundancy How To Mouse Managed Services Webcam Public Cloud Licensing Text Messaging Bluetooth Managed IT Service Evernote Statistics Virtual Assistant Processors Multi-factor Authentication Identity Theft Programming Telephone Notifications Network Congestion USB Memory Processor Co-managed IT Presentation Google Docs Start Menu Tech Terms User Error Inbound Marketing Politics Experience Virtual Reality Mobile Technology Emails Cleaning Specifications Safety Automobile Monitors Streaming Media Smart Devices Motion Sickness Advertising Flash Navigation Google Drive Virtual Machine Windows Server 2008 Procurement Business Cards Service Level Agreement Scalability CIO Product Reviews Reviews Startup Asset Tracking Digital Signature Unified Threat Management Backup and Disaster Recovery Messenger Tracking Staffing Google Wallet Organization Username Windows XP Data Analysis Spyware Read Mobile Payment Communitications Screen Reader Customer Resource management Rental Service Society GDPR Managing Risk PCI DSS Gamification Displays Printers Electricity SQL Server Printing Web Server Device Management Tech Hypervisor Supply Chain Management Piracy Upload Cabling Micrsooft Best Practives Shopping Smart Tech Hybrid Cloud Television Internet Service Provider Fiber-Optic Database Books Workers Drones Business Managemenet Upselling PDF AI HTML Administrator Content Management Fileless Malware cache IT Assessment Telephone System Supercomputer Modem Strategy Microserver Regulations Compliance Mobile Security Proxy Server WannaCry Azure Video Surveillance Best Available Keyboard Permissions Language online Currency Term Freedom of Information Saving ZTime Domains Remote Working Software License Trends Worker Electronic Medical Records Corporate Profile Transportation Gig Economy Multi-Factor Security Directions Assessment SharePoint Public Speaking Fraud Tactics Reading Samsung Recording Optimization Get More Done Supply Chains Devices Shortcut Electronic Health Records Employer Employee Relationship Music LinkedIn SSID Tip of the week Turn Key Harddrive Financial Data UTM Content G Suite switches Writing Dark Web Free Resource Google Calendar Printer Server Debate Error Hacks Physical Security Processing Touchscreen News Troubleshooting IT Plan Enterprise Resource Planning Upgrades Health IT VoIP Trojan GPS Entrepreneur Memes Smartwatch Legislation Archive Consultation Wasting Time Organize External Harddrive HIPAA Managing IT Services email scam Addiction Relocation Tablets Skype Logistics Knowledge Virtual Machines Environment 2FA Accountants A.I. Banking Botnet LiFi Competition Surveillance Cyber security Electronic Payment Telework Sync Bookmark Technology Tips Wireless Headphones CCTV Work/Life Balance Google Play Telephone Service Fake News Thin CLient Business Owner Remote Workers Migration Connected Devices Deep Learning Point of Contact Employer/Employee Relationships Audit 3D Ebay IT Visible Light Communication Managing Costs Data Warehousing Smart Phones IP Address Virtual Private Network Network Management Reliable Computing Microsoft 365 Equifax Fleet Tracking Business Metrics Computer Malfunction Application Development Medical IT Emergency Trend Micro Hard Drive Disposal Human Resources FinTech Device security MSP In Internet of Things IT consulting Browsers Access Webinar Nanotechnology Social Network Recycling Security Cameras Threats Microsoft Excel Leadership Data Storage Desktop Finance User Tip Analytic Proactive Maintenance Computer Care Adminstration Pirating Information Managing Stress Regulation CrashOverride Personal Information Capital CES 3D Printing Financial Productuvuty

toner1