Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

The breach in question happened on January 7th, 2016, and it’s estimated that up to 320,000 Time Warner Cable customers could have had their email addresses and passwords stolen. The cable company was notified by the FBI of the data theft, and Time Warner Cable proceeded to notify its affected users of the situation, both through email and direct mail. Time Warner Cable, however, vehemently declares that their systems failed to exhibit signs of a data breach.

This is hardly the first time that a major ISP’s information was breached or stolen by scammers. Just last November, Comcast had to reset the passwords of nearly 200,000 customers that were found on the black market. In this case, the incident was blamed on phishing attacks that coerced users into handing over their credentials, but what happened with Time Warner Cable isn’t so clear.

Time Warner Cable suggests that the theft occurred thanks to potential phishing attempts directed at the company, or it was the result of a data breach at other companies storing Time Warner Cable customer credentials. Either way, the fact remains that Time Warner Cable suffered a data theft, and is now paying for it with the stigma associated with lost credentials, and frustrated or simply worried customers.

As a business owner, you need to ask yourself if your organization can handle losing this much face, and more importantly, the financial burdens of allowing data breaches to happen. Most businesses that lose data due to data breaches, and aren’t able to recover quickly, go out of business within one year of the incident. That’s not to mention the fines of personal or sensitive information being stolen or compromised. If this happens, you can expect some nasty compliance fees that could break both your budget and your operations. This is why it’s a best practice to take preventative measures to keep hackers out of your network in the first place.

In general, it’s a good idea to change your passwords every now and then, especially if they’re still the default password that hasn’t been changed in several months or even years. Your passwords should always be long and complex, with both upper and lower-case letters, numbers, and symbols. Of course, these tips won’t help you much if your password gets sold on the black market, but it will keep the average hacker from cracking your password through brute force alone.

A password manager is a great way to keep your business’s credentials safe, without compromising security. The password manager stores your company’s credentials in a secure location and calls them only when you need them. It’s great for maintaining security while being able to remember your passwords.

For more information, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Training Gadgets Compliance Covid-19 Cloud Computing Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Vendor Two-factor Authentication Managed Services Apps Data Security Mobile Office Gmail WiFi Voice over Internet Protocol Tip of the week Employer-Employee Relationship Chrome Budget Apple Networking App Mobile Device Management BYOD Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Hacker Managed IT Services How To Avoiding Downtime BDR Marketing HIPAA Router 2FA Virtual Private Network Risk Management Health Big Data Help Desk Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Computers Bring Your Own Device Website Operating System Windows 11 Display The Internet of Things Printer Excel Paperless Office Infrastructure Monitoring Social Remote Workers Document Management Managed IT Service Free Resource Customer Service Telephone Project Management Windows 7 Scam Data loss Microsoft 365 Cooperation Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Firewall Cybercrime VPN YouTube Meetings Holidays Cryptocurrency Data Storage Safety Supply Chain User Tip Modem Video Conferencing Computer Repair Mobile Security Processor Managed Services Provider Professional Services Virtual Desktop Virtual Machines LiFi Data storage Smart Technology Outlook Machine Learning iPhone Money Saving Time Customer Relationship Management Humor Vulnerabilities Maintenance Data Privacy Hacking Antivirus Sports Downloads Presentation Mouse Images 101 Licensing Multi-Factor Authentication Mobility Wireless Technology Entertainment Administration Telephone System Employees Robot Integration Word Cost Management Settings Printing Wireless Content Filtering IT Management Medical IT Entrepreneur Reviews Network Congestion Specifications Internet Exlporer Development Knowledge Fraud Transportation Small Businesses Google Drive User Error Microchip Username Hypervisor Displays 5G Black Friday PowerPoint Undo Shopping Point of Sale Optimization Unified Communications Database Experience Employer/Employee Relationships Outsourcing Google Docs Bitcoin Network Management PCI DSS Running Cable Tech Support IT Technicians Navigation Monitors Cyber Monday Workplace Google Wallet Proxy Server Gig Economy Cookies Tactics Internet Service Provider Hotspot Teamwork Hiring/Firing Application Windows 8 Regulations Compliance Laptop Websites Mirgation Evernote Paperless Co-managed IT Drones Nanotechnology Memes Addiction Net Neutrality Electronic Medical Records Language SQL Server Technology Care IBM SharePoint Management Financial Data Halloween Chatbots History Business Communications Writing Distributed Denial of Service Scams Lenovo Smartwatch Screen Reader IT Service Level Agreement Procurement Virtual Reality Computing Infrastructure Azure Hybrid Work Hacks Server Management Telework Scary Stories Private Cloud Identity Cyber security Tech Human Resources Fun Cables Competition Superfish Bookmark CES Identity Theft Smart Tech Communitications Deep Learning Download Supply Chain Management Twitter Alerts FinTech Error Term Google Apps Social Engineering Break Fix IT Maintenance Browsers Education Connectivity IT Assessment Upload Flexibility Remote Computing Value Business Intelligence User Mobile Computing Social Network Organization Multi-Factor Security Shortcuts Search Dark Web Ransmoware Digital Security Cameras Tablet IoT Smart Devices Best Practice Trends Remote Working Alert Memory Vendors IP Address Managed IT Customer Resource management Buisness File Sharing Regulations Data Breach Dark Data Google Calendar Google Play Be Proactive How To Microsoft Excel Workforce Legal Data Analysis Videos IT solutions Star Wars Electronic Health Records Business Growth Gamification Notifications Staff Wasting Time Threats Recovery Hard Drives Travel Social Networking Trend Micro Legislation Security Cameras Workplace Strategies Software as a Service Cortana Meta Domains Techology Fileless Malware Google Maps Alt Codes Content Wearable Technology Managing Costs Amazon SSID Refrigeration Health IT Downtime Unified Threat Management Motherboard eCommerce Comparison Surveillance Permissions Virtual Assistant Outsource IT Public Speaking Unified Threat Management Directions Hosted Solution Assessment Typing Virtual Machine Environment Media Lithium-ion battery

Blog Archive