Data Breach Protection

Yahoo’s security breach has shaken things up a bit when it comes to password protection. Are you guilty of using the same password for multiple accounts? With the added requirements that passwords must be 8 characters long, contain at least one number, one Capital Letter and one special character, many consumers keep the same password or similar passwords for all their accounts so they can remember it. What about your security questions? Are they the same for every account as well? During the Yahoo Breach the data that was stolen included names, email addresses, phone numbers, (scrambled) passwords, and security questions/answers. If you use the same password, email, and/or security questions for multiple accounts, and you were hacked, you should definitely change all passwords/questions to make sure your information cannot be used to enter into other accounts.

When a large company gets hacked that is supposed to have “top of the line” security, you begin to wonder. If someone was able to hack them, what about me? What about my company? We don’t have a million dollar network protection plan installed… how do I reduce the risk of this happening to my customers? How do I protect not only them, but myself and my company?


IBM has an tried and true solutions for all your security needs, no matter how big or small your company is. In today’s world, you need to be protected. Consumers are asking how their information is stored, protected and accessed. Provide them and yourself, with peace of mind and get started choosing the perfect solution for your needs today. Check out this white paper about securing cloud applications for a safer environment and also a previous post on IBM’s Qradar solution.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s