Website security caught with it's pants down. Lacks in data security

Website security caught with it's pants down. Lacks in data security

According to the team, an authentication failure on the website allowed for unfettered access to all user accounts hosted by the Luscious database. Usernames, personal email addresses, locations, activity logs, genders, and some full names -- exposed through the private email addresses -- were available.

A tip to prevent a Data Breach

article image.png

In a recent article, “How to avoid becoming the next victim of a data breach” by Ben Wolford, several tips are offer to assist individuals to help save their important electronic data from the trappings of cyber criminals.

One such tip states to:

Reduce the amount of information you give out

This isn’t always possible or practical, but companies can’t expose data they don’t have. It’s the most sure-fire way to mitigate your risk of a data breach. In the case of medical or financial information, our control is limited. Banks, credit bureaus, and other financial institutions collect your data often for regulatory purposes or through agreements you can’t opt out of.

But other companies — particularly websites operators like Google, Facebook, or Twitter — usually only collect and store information that you allow them to have.

For example, this article shows you how to delete your Google data. In the early days of Facebook, many people treated photo albums as cloud storage. But multiple privacy and security breaches at Facebook have shown that information stored on the company’s servers is not necessarily safe. Privacy settings are not a solution because the data is still vulnerable to breaches, even if your friends and followers can’t see it.

Let e-End help keep your company compliant. Click the image to find out more.

Let e-End help keep your company compliant. Click the image to find out more.


Ben Wolford is a writer at Protonmail. A journalist for many years, Ben joined Proton to help lead the fight for data privacy.

The Fight Against Cyber Crime Land a Positive Blow

The Fight Against Cyber Crime Land a Positive Blow

Companies and individuals must protect their data as they would their physical assets.  Spend a little extra on digital security software. Monitor your systems for vulnerabilities, scan and update often, implement firewall protection, change passwords often and never repeat them, and purge legacy systems. By actively promoting good cyber hygiene practices, servers, personal computers, mobile phone and IoT devices’ data will be better protected and outside attacks will be thwarted.