Posts

Data Breach Notice: MyFitnessPal – 143,606,147 breached accounts

In February 2018, the diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested [...]

Data Breach Notice: MyHeritage – 91,991,358 breached accounts

In October 2017, the genealogy website MyHeritage suffered a data breach. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a [...]

Data Breach Notice: Dubsmash – 161,749,950 breached accounts

In December 2018, the video messaging service Dubsmash suffered a data breach. The incident exposed 162 million unique email addresses alongside usernames and PBKDF2 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".

Security Tips to Stay Safe Online

Every day we use the internet for just about everything you can think of. With over 650 million websites worldwide, online gaming and social networking, keeping safe online can be tricky to comprehend. Fortunately there are some simple steps we can incorporate into our online life to stay safe and secure. Keep your computer secure Ensure all software (including your web browser) current by installing updates. This is usually as simple as turning on automatic updates on your computer but sometimes [...]

Security Considerations

Running any business requires a level of ICT understanding, we have listed 8 common security considerations you will come across during your accreditation journey.    1.  Passwords In today’s business-world ICT plays a fundamental part, with every system there is the basic security of a username and password. Now while most of the usernames that you use will most likely be different, do you tend to use the one password or do you have several? Having one password for all your ICT access [...]

What is RAID?

Introduction RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvements. Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. The different schemes, or data distribution layouts, are named by the word "RAID" followed by a [...]

3 Views on Cloud Storage

Just thought I would comment on the use of Cloud Computing for data storage, such as Backups files and Data Repositories. To provide a bit of background I have experience working in 3 roles; as an onsite technician, a developer for medical databases and also as a data hoarder, storing backup data for clients. I've tried to give my comments on each different point-of-view which may conflict and not be totally relevant to your business alone. My experience as an Onsite Technician [...]

ICTAA Level 3 Accreditation: Business Continuity

Business Continuity Accreditation is for the forward-thinking business who won't tolerate ICT outages and disruptions, this level will pull together various automated redundancies focused on increasing system availability so staff can operate without interruptions, we also will explore disaster recovery techniques and ICT security. As a forward-thinking business, you will develop ICT lifecycles that will help to navigate your future ICT requirements and this also works to ensure your ICT evolutions is heading in the desired direction. Some of the items [...]

ICTAA Level 2 Accreditation: Business Intelligence

Business Intelligence Accreditation is for the business who is focused on leveraging their ICT ecosystem to gain the greatest efficiencies, this level helps you to further streamline your procedures and reduce the unnecessary IT annoyances for example, we will explore your email systems and implement Spam mitigation and other security strengthening. We will also take a deeper look at your IT systems and discover ways to reduce outages and time to recover from disasters. Some of the items we cover [...]

ICTAA Level 1 Accreditation: Business Awareness

Business Awareness Accreditation is for the business who wants to get a snapshot of their current ICT ecosystem and establish solid ICT management frameworks within their business, we cover basic processes and various IT components, this incorporates documenting your assets and building up repositories of critical information. We also explore basic processes in your business for example, we will explore your data backup procedures and ensure that you have adequate protections in place to backup and protect your business data. Some [...]