Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

The breach in question happened on January 7th, 2016, and it’s estimated that up to 320,000 Time Warner Cable customers could have had their email addresses and passwords stolen. The cable company was notified by the FBI of the data theft, and Time Warner Cable proceeded to notify its affected users of the situation, both through email and direct mail. Time Warner Cable, however, vehemently declares that their systems failed to exhibit signs of a data breach.

This is hardly the first time that a major ISP’s information was breached or stolen by scammers. Just last November, Comcast had to reset the passwords of nearly 200,000 customers that were found on the black market. In this case, the incident was blamed on phishing attacks that coerced users into handing over their credentials, but what happened with Time Warner Cable isn’t so clear.

Time Warner Cable suggests that the theft occurred thanks to potential phishing attempts directed at the company, or it was the result of a data breach at other companies storing Time Warner Cable customer credentials. Either way, the fact remains that Time Warner Cable suffered a data theft, and is now paying for it with the stigma associated with lost credentials, and frustrated or simply worried customers.

As a business owner, you need to ask yourself if your organization can handle losing this much face, and more importantly, the financial burdens of allowing data breaches to happen. Most businesses that lose data due to data breaches, and aren’t able to recover quickly, go out of business within one year of the incident. That’s not to mention the fines of personal or sensitive information being stolen or compromised. If this happens, you can expect some nasty compliance fees that could break both your budget and your operations. This is why it’s a best practice to take preventative measures to keep hackers out of your network in the first place.

In general, it’s a good idea to change your passwords every now and then, especially if they’re still the default password that hasn’t been changed in several months or even years. Your passwords should always be long and complex, with both upper and lower-case letters, numbers, and symbols. Of course, these tips won’t help you much if your password gets sold on the black market, but it will keep the average hacker from cracking your password through brute force alone.

A password manager is a great way to keep your business’s credentials safe, without compromising security. The password manager stores your company’s credentials in a secure location and calls them only when you need them. It’s great for maintaining security while being able to remember your passwords.

For more information, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 03 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Passwords Communication Saving Money Data Backup Smartphone Backup Managed Service Android VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Windows Microsoft Office Managed IT Services Productivity Remote Current Events Network Tech Term Internet of Things Artificial Intelligence Facebook Automation AI Cloud Computing Covid-19 Holiday Gadgets Server Managed Service Provider Remote Work Miscellaneous Information Outsourced IT Compliance Training Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management IT Support Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Two-factor Authentication Data Security Mobile Office Vendor Apps Networking Chrome Mobile Device Management Budget BYOD Gmail Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Hacker How To BDR Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control WiFi Tip of the week Conferencing Computing Information Technology Computers Managed IT Services Website Office Tips Analytics Augmented Reality Storage Router Password Bring Your Own Device Virtual Private Network Health Big Data Help Desk Operating System Retail Healthcare Risk Management Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Physical Security Display Printer Paperless Office The Internet of Things Windows 11 Infrastructure 2FA Monitoring Going Green Social Excel Document Management Cybercrime Remote Workers Telephone Customer Service Scam Data loss Presentation Vulnerabilities Entertainment Data Privacy Virtual Desktop Wireless Technology Data storage LiFi Images 101 Robot Mobility Telephone System Outlook Multi-Factor Authentication Cost Management Money Word Humor IT Management VPN Employees Meetings Integration Sports Mouse User Tip Modem Processor Safety Computer Repair Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Settings Saving Time Printing Wireless Content Filtering Customer Relationship Management Managed IT Service Maintenance YouTube Downloads Antivirus Cryptocurrency iPhone Licensing Hacking Multi-Factor Security Tech Human Resources Experience Social Network Telework Google Docs Cyber security Unified Communications Tablet IoT Communitications Bitcoin Dark Web Cables Running Cable User CES Trends Supply Chain Management Google Wallet Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment Windows 8 IP Address How To Microsoft Excel IT Maintenance Laptop Data Analysis Gamification Flexibility Drones Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Google Maps Smart Devices Ransmoware Halloween Recovery Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Hard Drives Domains Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Hacks Permissions Workforce Scary Stories Unified Threat Management Directions Videos Wasting Time Threats Refrigeration Fun Deep Learning Public Speaking Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Lithium-ion battery Fraud Meta User Error Microchip Entrepreneur Username Managing Costs Amazon Education Black Friday SSID Point of Sale eCommerce Database Surveillance Mobile Computing Virtual Assistant Outsource IT Search Network Management Tech Support IT Technicians Virtual Machine Environment Undo Media Cookies Best Practice Monitors Cyber Monday Medical IT Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Buisness Legal Websites Mirgation Hypervisor Displays IT solutions Nanotechnology Optimization Business Growth PowerPoint Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Application Navigation Cortana Management PCI DSS Chatbots Screen Reader Alt Codes IBM Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Downtime Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Hosted Solution Identity Theft Smart Tech Memes Typing Co-managed IT Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Knowledge Financial Data Google Drive Error History Competition Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work 5G

Blog Archive