Your Password has already been compromised!
Rob Steele
Vice President of Modern Infrastructure: Leveraging Technology for Strategic Growth
Hackers just revealed the largest collection of data breaches ever, they call COMB (Compilation of Many Breaches). In this new dataset, it includes 3.2 billion... that's BILLION different email and password combinations from multiple breaches and leaks as recent as last week.
The leaks are from companies like Netflix, LinkedIn, and other very popular sites. I personally checked the database and found some of my emails listed. Even with as much care as I take to keep my personal information safe, this new dataset is no joke.
While my personal data is obviously important to me, my main concern is the amount of users that use their business emails for these accounts and usually also use the same passwords. It's only a matter of time before someone is able to gain access to an enterprise account and do whatever they want.
Even with firewalls and antivirus, a simple login with a current user can gain unguarded access to sensitive or valuable business data. So how do you prevent an RGE (Resume Generating Event) or something worse? Well there is no one sword to rule them all, but luckily we have come up with a two step framework for not only detecting a breach but also being able to recover from a breach in the event that action wasn't taken fast enough.
I would normally post all the steps and implementation requirements here, but as this is a public article... I don't want the wrong audience to poke holes in it. However I am more than happy to help if this is something your company needs, just send me a message.
If you are just looking for some extra steps to keep your personal accounts safe, I recommend changing your passwords at least quarterly, if not monthly. I've also implemented 2FA (2 Factor Authentication) into my important accounts, and leveraged a password manager for others.
This should be a bare minimum as artificial intelligence and machine learning are only going to make hacker tools even easier in the future. Stay safe out there!
Chief Marketing Officer | Product MVP Expert | Cyber Security Enthusiast | @ GITEX DUBAI in October
2 年Rob, thanks for sharing!
CEO at Four Site Inc
4 年Agree completely, triangulation of PII or other personal data points seems a natural progression for threat actors. People as you say don’t realize that information can be gathered together over time and over multiple loss points. Appreciate the advice and the shared knowledge as always Rob. Knowledgeable and well versed in the fight against cyber crime. ??