Macatawa Technologies Logo

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

Lesson One: Don’t Reuse Your Passwords

Here’s the deal—hackers were able to access 350,000 accounts on Spotify’s systems without having to attack the streaming service at all. Instead, these hackers used login credentials that other data breaches had exposed on other sites and services.

Basically, the hackers took the credentials that had been taken from other breached websites and tried them out on Spotify to see what worked. This practice, known as credential stuffing, is a common and simple one for attackers to use.

Of course, while having any password breached isn’t a good thing, it can really become a problem if a user has reused that combination of credentials on multiple platforms. That’s why it is considered an essential best practice to always have a unique password for each account—especially any work-related or financial accounts—you use, saved in an encrypted password management tool if necessary.

Lesson Two: Make Sure Your Data is Secured

In a roundabout way, the people responsible for this breach can teach us another important lesson in data security—namely, the importance of properly securing the data that is collected.

This security issue was discovered when two researchers were scanning the Internet for unsecured data. The hackers had shortsightedly saved their stolen credentials on an unsecured cloud database, where anyone could presumably access them… no password required. As a result, other cybercriminals could have easily found the data as well and copied it for their own purposes.

While we’re happy that this data was found, it does shine a light on how important it is to keep your data secured and private. After all, Spotify has since prompted a password reset for affected users and rendered this data obsolete… at least, obsolete on the streaming platform. If the hackers had stored this data a little more securely, this data would still be that much more accurate.

You should learn from their example and take steps now to ensure that your data is good and properly secured.

Macatawa Technologies can help you put both important lessons into practice. Reach out to us today to learn more about your data security and what you can do to help protect your assets without sacrificing productivity. Give us a call at 616-394-4940 today.

Don't forget to share this post!

Topics

Recent Articles

Why an IT Budget is an Investment, Not an Expense

Many small business owners view their IT spending as a necessary evil - just another line on the expense report. But an IT budget for a small business is one of the smartest investments you can make. Properly allocated, it not only keeps your operations running...

How To Breakdown Your Businesses IT Budget

When many business leaders hear the word budget, their minds immediately go to expense sheets, cost-cutting measures, and financial restrictions. But when it comes to IT budgeting, thinking only in terms of costs can be short-sighted and more costly in the long run....

Personal vs Business AI Explained

Artificial Intelligence has entered everyday life in powerful ways, from chatbots on our phones to advanced analytics in the boardroom. But not all AI is built or should be used the same way. The biggest distinction lies in personal AI vs business AI. Each serving...

You may also like…