an interesting situation with an email provider and the issues they are facing with the hijacking of customer mailboxes:
“I am sorry to hear that you were experiencing issues with email latency. We are working on making changes to resolve the issues with latency. In the meantime you may see peaks of latency. We are monitoring the servers and will clear blocked queues as they arise. These traffic jams are caused by hackers hijacking our customers mailboxes that have weak passwords. We have setup automatic suspensions to stop these mailboxes faster. We are recommending to all of our customers to make passwords as secure as possible to help prevent this issue.”
With the negative effects on their customers you have to wonder if they are supporting encrypted communications to their POP3 and SMTP servers. It seems with this provider they were still using clear-text ports 110 and 25 respectively. What they think is protecting their servers are strong passwords…but what good is a “strong password” if it’s being sent to their mail servers in the clear? When checking their password complexity rules:
“Passwords must be 8-14 characters, with at least one letter, plus one number or special character [!@#$%^&*]”
It is amazing to think that a password such as “Password1″ would be enough to be considered strong. With email being a very weak link in many organizations it is alarming to see that this is considered secure. Many providers are operating with a false sense of security which is not disclosed to their customers. What is your email provider using?
Wed, Dec 11th 2013 1:12p Elizabeth Romeril Passwords we all have them, but we all can’t remember them: A satirical observation on the complexity of passwords.
There is so much pressure on choosing the “right” or “R!6ht” password, it has to exceed 6 characters and even though we really wanted to use our dogs name “Spot,” which won’t work since it’s only four characters. So we are then left to think of some other variation to use that we then may or may not remember. Then it becomes an ordeal to just remember is it spot12 [read] Keywords: password
EU Behind the Times for Cyber Security
Mon, Dec 9th 2013 2:12p Elizabeth Romeril Often in our blog we focus on what is happening here in America, but we work with companies all over the globe. Recently, there was a survey done by the where they questioned over 27,000 people in the European Union about their internet use, security attitudes and experiences. 1 The survey showed that individuals in the EU were behind the times when it came to cyber security.
Just over a quarter those surveyed only use their own hardware to go online, and just under that figure (24%) use uni [read] Keywords: password
Shopping Smart Series: Cyber Monday
Mon, Dec 2nd 2013 1:14p Rob Bellefeuille With the shopping season upon us we wanted to give you some safe shopping tips to help keep you protected while you are out-and-about or online.
Safeshopping.org has a great “Top Ten List” of safe online shopping tips. Some highlights from that list include trusting your instincts and making sure that you are shopping from a trusted retailer. Also, if a deal looks too good to be true, do your homework and make sure the item and website are legitimate, and exactly what you are looking for. [read] Keywords: wifi
Shopping Smart Series: Unsecured Wi-Fi and You
Wed, Nov 27th 2013 9:18a Rob Bellefeuille With the shopping season upon us we wanted to give you some safe shopping tips to help keep you protected while you are out-and-about.
Free Wi-Fi is a great thing; it saves data usage on your cell phone plan, and allows you to access all of the great things the internet has to offer. Like all good things there are people out there who are looking to ruin the fun for the rest of us. Knowledge is power and with the know how you can protect yourself from these attacks, and ensure that you have a ha [read] Keywords: mobile
Shopping Smart Series: Black Friday
Tue, Nov 26th 2013 2:18p Rob Bellefeuille With the shopping season upon us we wanted to give you some safe shopping tips to help keep you protected while you are out-and-about.
Black Friday was originally used to describe companies to going from red-to-black in their books or loss-to-profit for the year. In the 1960s, Black Friday was used to describe the rush of crowds to the stores, the day after Thanksgiving. According to market-research firm ShopperTrak, “Since 2002, Black Friday has been the season’s biggest shopping day ea [read] Keywords: connections
Update Your Security Software before Opening “that” Email
Mon, Nov 25th 2013 3:18p Christopher Hoey Hackers continue to defy the odds, finding more creative ways to plant malware on devices. Some of their tactics are highly innovative, but so simple at the same time that even a well-educated computer user overlooks the fact that it may be a virus.
Just this past week, they built a simple email scheme that made it look like the recipient’s security software needed updating. Then it instructed the user to download an update, which was a piece of malware. The malware used a process calle [read] Keywords: email
IT Leaders Identify the Cost of Security Breaches Have Highest Impact
Thu, Nov 21st 2013 8:15a Rob Bellefeuille With the current state of the economy, it seems that almost every penny is scrutinized when it comes down to budgeting. One surefire way to blow an IT budget is a security breach, it costs companies more than just man hours, but also data loss and potential reputation damage. Most breaches occur at a log-in portal, then connecting horizontally across a company’s info structure until they obtain information or take down a piece of the site or system.
This week EMC, a data management and protect [read] Keywords: security