Your Password has already been compromised!
You've been hacked, now what?

Your Password has already been compromised!

Hackers just revealed the largest collection of data breaches ever, they call COMB (Compilation of Many Breaches). In this new dataset, it includes 3.2 billion... that's BILLION different email and password combinations from multiple breaches and leaks as recent as last week.

The leaks are from companies like Netflix, LinkedIn, and other very popular sites. I personally checked the database and found some of my emails listed. Even with as much care as I take to keep my personal information safe, this new dataset is no joke.

While my personal data is obviously important to me, my main concern is the amount of users that use their business emails for these accounts and usually also use the same passwords. It's only a matter of time before someone is able to gain access to an enterprise account and do whatever they want.

No alt text provided for this image

Even with firewalls and antivirus, a simple login with a current user can gain unguarded access to sensitive or valuable business data. So how do you prevent an RGE (Resume Generating Event) or something worse? Well there is no one sword to rule them all, but luckily we have come up with a two step framework for not only detecting a breach but also being able to recover from a breach in the event that action wasn't taken fast enough.

I would normally post all the steps and implementation requirements here, but as this is a public article... I don't want the wrong audience to poke holes in it. However I am more than happy to help if this is something your company needs, just send me a message.

If you are just looking for some extra steps to keep your personal accounts safe, I recommend changing your passwords at least quarterly, if not monthly. I've also implemented 2FA (2 Factor Authentication) into my important accounts, and leveraged a password manager for others.

This should be a bare minimum as artificial intelligence and machine learning are only going to make hacker tools even easier in the future. Stay safe out there!

Monikaben Lala

Chief Marketing Officer | Product MVP Expert | Cyber Security Enthusiast | @ GITEX DUBAI in October

2 年

Rob, thanks for sharing!

回复
Marc Kelly

CEO at Four Site Inc

4 年

Agree completely, triangulation of PII or other personal data points seems a natural progression for threat actors. People as you say don’t realize that information can be gathered together over time and over multiple loss points. Appreciate the advice and the shared knowledge as always Rob. Knowledgeable and well versed in the fight against cyber crime. ??

要查看或添加评论,请登录

Rob Steele的更多文章

社区洞察

其他会员也浏览了