Yahoo’s Big Breach Is A Catalyst for Change

Yahoo’s latest security breach where hackers stole personal details from a billion users has the potential to become the biggest attack in history.

It was only in September that Yahoo disclosed that the company had lost access control for over 500 million accounts, so this latest attack is double the number of accounts involved and has become one of the largest hacks ever discovered.

To make matters worse, reports suggest that the attack happened as far back as August 2013 and yet users are only being informed now to change their password. By my calculation, that’s more than three years that the attackers have had to exploit the information.

So the question is whether this event will finally be the catalyst not only for Yahoo, but also every other organisation that maintains customer accounts, to force much-needed change in our continued reliance on passwords alone to secure our online accounts?

To be fair, Yahoo has been encouraging its account holders to use an alternative factor to the password with what they call the ‘Yahoo Account key’, but this could be seen as ‘closing the barn door after the horse has bolted’.

While the Yahoo breach is an astonishing story in itself, especially given it is not the first time and the number of users involved, we could argue that it is more about how businesses with many millions of customers handle the incident and the impact that can have on the company itself and its reputation. The stakes for adequately securing access to corporate resources and personal customer details, as well as the way businesses respond to incidents like this, have never been higher.

Doing Business with Breached Companies

Earlier this year, we surveyed thousands of consumers and found that two-thirds are likely to stop doing business with an organisation that has been breached.

This is akin to customers walking straight out of your shop or business and going to the competitor next door. Businesses cannot and should not wait until they are breached to offer more secure access control, and by more, we mean not just a username and password. These are simply not fit for purpose any more. Any company unable to do this should be viewed with suspicion and their judgment and trustworthiness called into question!

So what about the users themselves? Despite the increasing number of high profile data breaches, it appears that some of us still adopt poor password habits and fail to take adequate precautions to protect our personal information. The same survey revealed that a third of consumers in the UK only change their password once a year, less or never, shocking in itself.

But it’s also clear that many then opt to use phrases or words that are easy to remember, but unfortunately also easy for hackers to crack. Once again it’s the old conundrum of convenience over security – people want speed to access and not multiple tie-consuming layers of security to contend with just to purchase something online, and many never learn until they become a victim themselves.

Good password hygiene is fundamental to operating online and should remain central to an organisation’s central security policy. But more must be done to educate users and making them aware that usernames and passwords are an easy entry point for hackers to gain entry to a business.

More organisations are tuning to multi-factor authentication (MFA) to provide better safeguards in today’s increasingly complex online world. MFA helps alleviate password risk by requiring additional authentication factors, such as a PIN, a security question or a one-time security code. It’s the combination of something you have and something you know.

Back to the Yahoo beach and the long-term impact it could have on the business and ultimately the company’s future.

Leading the Charge

Whether customers decide to stay with Yahoo or decide to make the switch to another provider, the advice is the same. Fasten your ‘cyber safety belt’ by turning on multi-factor authentication. After all, over the last few decades, most of us have come to accept that seat belts are an essential safety measure.

The ‘Clunk Click’ education campaigns of yesteryear have been highly effective. Perhaps this latest large-scale security event will serve to raise awareness about the inadequacy of the common password and to introduce the concept of the ‘cyber safety belt’, two-factor authentication.

Yahoo is simply not safe to use unless you turn on Yahoo Account Key or another multi-factor authentication solution. In fact, Yahoo might be better served if they only accepted Account Key or another MFA and stopped allowing passwords by themselves.

As 2016 draws to a close on a challenging year in many ways, but especially in cybersecurity, perhaps we should be calling on visionary and forward-thinking companies to stop accepting passwords on their own to applications and accounts.

Instead, they should be providing the kind of protection that both organisations and its users need in today’s increasingly complex and vulnerable security environment, to help mitigate password risk and force the issue of requiring additional factors of authentication.

Yahoo could bow to the pressure of becoming the victim of multiple attacks, or it could rise to the challenge and take this opportunity to position itself as a leader in security. Like Apple getting rid of Ethernet and other out-of-date ports on its hardware. Yahoo should accept the responsibility, respond accordingly, communicate the fix and then go on to be a leader in catalysing positive change across the industry.

Yahoo needs to lead the charge across the industry. Compromised enterprises face huge barriers to rebuilding customer trust and brand reputation. And for Yahoo, this may be an insurmountable task.

ITProPortal:           How Cyber Attacks Will Get Worse In 2017:

 

« Cyber Criminals Target African Banks
One Million Say Pardon Snowden & Russia Says He Can Stay Two More Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

European Digital Media Association (EDiMA)

European Digital Media Association (EDiMA)

EDiMA, is the European trade association representing online platforms. It is an alliance of new media and Internet companies.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.