Security Breach Compromises User's Accounts & Information
Last week, names and passwords of Yahoo Mail users were hacked and used to gather personal information about people with whom those users had recently corresponded. Yahoo responded quickly by alerting users of the breach. They also required a password reset and used a two-step verification on the accounts that were hacked. A Yahoo blog post "important security update for Yahoo Mail users" further identified what Yahoo is doing to remedy the situation and outlines what users can do to keep their accounts secure.
Many of the most recent security breaches are a byproduct of users’ passwords being accessed through other services and hackers using this information to gain entry to their accounts. With the proliferation of SaaS and the vast amounts of personal information and data that is stored in the cloud, many organizations are leaving themselves even more vulnerable to a breach. Inevitably, users are using the same passwords across all of their SaaS applications and as adoption increases, both in and out of the enterprise, so does the threat of a breach. Many users say that it’s not plausible for users to remember 40+ different passwords for their various applications.
There is a solution!
Single sign-on solutions like Bitium go a long way to protect corporate data and preventing security breaches like Yahoo experienced. Bitium allows companies to request and grant access to corporate accounts on behalf of partners without sharing passwords. This reduces the transfer of passwords and usernames while allowing internal and external teams alike to collaborate in order to reach their goals. Bitium also allows users to set a password for any application and never have to access it again. Users can find an auto-generated password through a number of 3rd party apps (Mashable compiled a list here) and after provisioning the app in Bitium, the information is securely stored and never has to be used again. If you need to see what your password is for any reason, there is a secure access dashboard where you can view the passwords that you have entered (more info here).
While cyber-criminals continue to advance, so do the measures and applications that keep individuals and companies information secure. Research the best solution for your organization and take every precaution to ensure you are not a target.
If you want to learn more about “opening up the cloud” and securing your businesses or your personal identity / data, sign up for a free webinar or request a live demo here.