Macatawa Technologies Logo

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

Lesson One: Don’t Reuse Your Passwords

Here’s the deal—hackers were able to access 350,000 accounts on Spotify’s systems without having to attack the streaming service at all. Instead, these hackers used login credentials that other data breaches had exposed on other sites and services.

Basically, the hackers took the credentials that had been taken from other breached websites and tried them out on Spotify to see what worked. This practice, known as credential stuffing, is a common and simple one for attackers to use.

Of course, while having any password breached isn’t a good thing, it can really become a problem if a user has reused that combination of credentials on multiple platforms. That’s why it is considered an essential best practice to always have a unique password for each account—especially any work-related or financial accounts—you use, saved in an encrypted password management tool if necessary.

Lesson Two: Make Sure Your Data is Secured

In a roundabout way, the people responsible for this breach can teach us another important lesson in data security—namely, the importance of properly securing the data that is collected.

This security issue was discovered when two researchers were scanning the Internet for unsecured data. The hackers had shortsightedly saved their stolen credentials on an unsecured cloud database, where anyone could presumably access them… no password required. As a result, other cybercriminals could have easily found the data as well and copied it for their own purposes.

While we’re happy that this data was found, it does shine a light on how important it is to keep your data secured and private. After all, Spotify has since prompted a password reset for affected users and rendered this data obsolete… at least, obsolete on the streaming platform. If the hackers had stored this data a little more securely, this data would still be that much more accurate.

You should learn from their example and take steps now to ensure that your data is good and properly secured.

Macatawa Technologies can help you put both important lessons into practice. Reach out to us today to learn more about your data security and what you can do to help protect your assets without sacrificing productivity. Give us a call at 616-394-4940 today.

Don't forget to share this post!

Topics

Recent Articles

OneDrive vs SharePoint: What’s the Difference and When to Use Each

OneDrive vs SharePoint: Understanding the Differences and Use Cases In today’s cloud-first world, Microsoft 365 offers powerful tools for file storage, collaboration, and productivity. Two of the most widely used are OneDrive and SharePoint. While both allow you to...

It Managed Services vs Break-Fix IT: What SMB’s Need To Know

For small and medium business owners, managing technology can feel like walking a tightrope. Choosing the right IT support approach can impact costs, productivity, and long-term business growth. Two common models are managed IT services and break-fix IT services, each...

The Benefits of Managed IT Services for Manufacturing Companies

Manufacturing companies today face a complex mix of technological challenges. From aging systems and legacy software to the growing number of IoT devices on the production floor, ensuring smooth operations requires more than just reactive IT support. This is where...

You may also like…