Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

If Time Warner Cable and Comcast Can Get Hacked, Then We All Can

b2ap3_thumbnail_twc_data_compromised_400.jpgThe number of high-profile hacks that have occurred over the past several years continues to climb, and it won’t let up anytime soon. Now, another incident involving Time Warner Cable, a large ISP in the United States, shows that even large companies that deal with sensitive information aren’t invincible from data breaches.

The breach, which happened on January 7, 2016, is estimated to have leaked up to 320,000 Time Warner Cable customers’ email addresses and passwords. Time Warner Cable was informed of the data breach by the FBI, and the cable company proceeded to explain the situation to their customers through both email and direct mail. Users were advised to change their passwords for good measure, but Time Warner Cable continues to deny that their systems exhibited signs of a data breach.

This isn’t the first time that a major ISP has had information breached or stolen by scammers. In November 2015, Comcast dealt with a breach of nearly 200,000 customer credentials, which were found on the black market. This prompted Comcast to reset the passwords. Even though this incident was blamed on phishing attacks that suggested users should hand over their credentials, what happened with Time Warner Cable is up for debate.

Time Warner Cable is under the assumption that the theft was potentially caused by phishing attempts directed at the company, or the result of a data breach of other companies that store Time Warner Cable’s customer information. Regardless of why or how the data was stolen, the fact remains that Time Warner Cable has lost face with their clientele--something that every business owner needs to take into account when dealing with sensitive client credentials.

It ultimately falls on your shoulders to ensure that your business doesn’t face a similar catastrophe, in which your clients’ personal information is leaked or stolen. The most dangerous part of losing track of your organization’s data is the fact that it can lead to immense financial issues. Businesses that fail to recover their data following a critical data loss incident typically go out of business within one year following the incident. Add in the compliance fines, and you have a situation that can quickly escalate beyond your control, breaking your budget and grinding operations to a halt. This is why it’s so effective to prevent breaches from happening in the first place.

Time Warner Cable suggested that their clients change their passwords, which is actually sound advice, regardless of whether or not you’ve been hacked. If you’re still using default passwords, or haven’t changed yours in several months, you could stand to change your password to something more secure. Your passwords should be long and complex, utilizing several different upper and lower-case letters, numbers, and symbols. This makes it much harder for a hacker to crack your account through brute force.

Password managers are great tools to help you keep track of complex passwords, without the pain of remembering different strings of characters for each of your accounts. A password manager stores all of your company’s credentials in a secure location, and calls them only when needed. This makes a password manager an invaluable tool for maximizing your password security.

For more information, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 05 November 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Upgrade Efficiency Workplace Tips Google Computer Hosted Solutions Microsoft Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Gmail Ransomware Microsoft Office Office Backup Apps Operating System Business Continuity Disaster Recovery Communication The Internet of Things Hacking Social Media WiFi Bandwidth Facebook Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Smartphones Managed Service Provider Outlook Firewall Content Filtering Cybercrime Wireless Technology Android Website Apple Best Practice Employer-Employee Relationship Alert History Two-factor Authentication Networking Small Business Data storage Phishing Data App Windows Experience Mobile Computing Big Data communications BYOD Downtime Social Networking End of Support Passwords Public Speaking Streaming Media Help Desk Disaster Micrsooft IP Address Visible Light Communication Virtualization Writing Business Growth Data Management Government Keyboard Recovery Robot Augmented Reality Advertising Search Society User Sports Google Wallet Hard Drives Spam Shortcut Running Cable Remote Computing Information Technology DDoS Windows 8 Internet of Things Retail Hosted Solution Heating/Cooling Windows XP Word IT Services Documents Artificial Intelligence Tech Support Compliance Managed IT services Drones Business Management Social Printer Competition Browser Bluetooth Presentation Virtual Desktop Entrepreneur Wireless Securty Automation Domains Unified Communications Document Management Encryption Memory Law Enforcement Hacker SaaS VoIP Deep Learning Proactive IT Application Cortana BDR Network Congestion Customer Service Vendor Management Save Money Music Router Laptop Monitors Office 365 Cryptocurrency IBM Saving Money Google Docs Analytics Education Cleaning Holiday intranet Displays Lithium-ion battery Black Market YouTube Processors Staffing Office Tips LiFi
QR-Code