Macatawa Technologies Logo

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

Lesson One: Don’t Reuse Your Passwords

Here’s the deal—hackers were able to access 350,000 accounts on Spotify’s systems without having to attack the streaming service at all. Instead, these hackers used login credentials that other data breaches had exposed on other sites and services.

Basically, the hackers took the credentials that had been taken from other breached websites and tried them out on Spotify to see what worked. This practice, known as credential stuffing, is a common and simple one for attackers to use.

Of course, while having any password breached isn’t a good thing, it can really become a problem if a user has reused that combination of credentials on multiple platforms. That’s why it is considered an essential best practice to always have a unique password for each account—especially any work-related or financial accounts—you use, saved in an encrypted password management tool if necessary.

Lesson Two: Make Sure Your Data is Secured

In a roundabout way, the people responsible for this breach can teach us another important lesson in data security—namely, the importance of properly securing the data that is collected.

This security issue was discovered when two researchers were scanning the Internet for unsecured data. The hackers had shortsightedly saved their stolen credentials on an unsecured cloud database, where anyone could presumably access them… no password required. As a result, other cybercriminals could have easily found the data as well and copied it for their own purposes.

While we’re happy that this data was found, it does shine a light on how important it is to keep your data secured and private. After all, Spotify has since prompted a password reset for affected users and rendered this data obsolete… at least, obsolete on the streaming platform. If the hackers had stored this data a little more securely, this data would still be that much more accurate.

You should learn from their example and take steps now to ensure that your data is good and properly secured.

Macatawa Technologies can help you put both important lessons into practice. Reach out to us today to learn more about your data security and what you can do to help protect your assets without sacrificing productivity. Give us a call at 616-394-4940 today.

Topics

Recent Articles

How to Build a 3-5 Year IT Roadmap

Technology decisions often happen reactively. A server fails, software becomes outdated, or a cybersecurity threat forces an urgent upgrade. While these situations are common, they often lead to rushed decisions and unexpected expenses. That’s why many organizations...

How to Switch IT Providers Without Disruption

Changing IT Providers Should Feel Controlled - Not Chaotic Switching IT providers doesn’t have to be a headache. In fact, when done correctly, it can make your technology stronger, more secure, and better aligned with your business goals. The key is a well-designed IT...

How to Safely Use AI Models At Work

Artificial Intelligence tools like ChatGPT are transforming the way businesses operate. From automating routine tasks to generating ideas, AI can boost productivity and efficiency - but only if used safely. Understanding best practices for using AI in business is...

You may also like…

How to Build a 3-5 Year IT Roadmap

How to Build a 3-5 Year IT Roadmap

Learn how to create an IT roadmap. Plan technology investments, improve scalability, and align IT with your company’s long-term goals.

Skip to content