ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

If Time Warner Cable and Comcast Can Get Hacked, Then We All Can

b2ap3_thumbnail_twc_data_compromised_400.jpgThe number of high-profile hacks that have occurred over the past several years continues to climb, and it won’t let up anytime soon. Now, another incident involving Time Warner Cable, a large ISP in the United States, shows that even large companies that deal with sensitive information aren’t invincible from data breaches.

The breach, which happened on January 7, 2016, is estimated to have leaked up to 320,000 Time Warner Cable customers’ email addresses and passwords. Time Warner Cable was informed of the data breach by the FBI, and the cable company proceeded to explain the situation to their customers through both email and direct mail. Users were advised to change their passwords for good measure, but Time Warner Cable continues to deny that their systems exhibited signs of a data breach.

This isn’t the first time that a major ISP has had information breached or stolen by scammers. In November 2015, Comcast dealt with a breach of nearly 200,000 customer credentials, which were found on the black market. This prompted Comcast to reset the passwords. Even though this incident was blamed on phishing attacks that suggested users should hand over their credentials, what happened with Time Warner Cable is up for debate.

Time Warner Cable is under the assumption that the theft was potentially caused by phishing attempts directed at the company, or the result of a data breach of other companies that store Time Warner Cable’s customer information. Regardless of why or how the data was stolen, the fact remains that Time Warner Cable has lost face with their clientele--something that every business owner needs to take into account when dealing with sensitive client credentials.

It ultimately falls on your shoulders to ensure that your business doesn’t face a similar catastrophe, in which your clients’ personal information is leaked or stolen. The most dangerous part of losing track of your organization’s data is the fact that it can lead to immense financial issues. Businesses that fail to recover their data following a critical data loss incident typically go out of business within one year following the incident. Add in the compliance fines, and you have a situation that can quickly escalate beyond your control, breaking your budget and grinding operations to a halt. This is why it’s so effective to prevent breaches from happening in the first place.

Time Warner Cable suggested that their clients change their passwords, which is actually sound advice, regardless of whether or not you’ve been hacked. If you’re still using default passwords, or haven’t changed yours in several months, you could stand to change your password to something more secure. Your passwords should be long and complex, utilizing several different upper and lower-case letters, numbers, and symbols. This makes it much harder for a hacker to crack your account through brute force.

Password managers are great tools to help you keep track of complex passwords, without the pain of remembering different strings of characters for each of your accounts. A password manager stores all of your company’s credentials in a secure location, and calls them only when needed. This makes a password manager an invaluable tool for maximizing your password security.

For more information, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Managed Service Apps IT Support Browser Windows 10 Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Workplace Strategy Gadgets Artificial Intelligence Managed IT services Networking Windows Business Technology Spam Information Bandwidth Server Encryption Mobile Device Management WiFi Blockchain Remote App Virtualization Two-factor Authentication Information Technology Office 365 History Budget Gmail Apple Employee/Employer Relationship Office Conferencing Health Wi-Fi Access Control Cybercrime Analytics Data Security Big Data BDR IT Management Document Management Training Voice over Internet Protocol Employer-Employee Relationship Hacker Save Money Vendor Compliance Remote Computing Patch Management Remote Monitoring Help Desk Cost Management Hacking Legal Search... Data storage Best Practice Mobile Office Money Retail Customer Service Alert Applications Unified Threat Management Managed Services Firewall Hiring/Firing Vulnerabilities Outlook Augmented Reality Word BYOD Password IBM Computing Website Vendor Management Hard Drive Project Management Data loss Law Enforcement Mobility Marketing End of Support Meetings Printer Running Cable Laptop Google Maps Scam Storage Windows 11 Remote Workers Data Breach Travel Windows 7 VPN Virtual Reality Social Engineering Social Free Resource Sports SaaS DDoS Cryptocurrency Black Market Update User How To Cleaning iPhone Robot Monitoring Education Cortana Healthcare Content Filtering Paperless Office Antivirus Chrome Maintenance Router Twitter The Internet of Things Mobile Computing YouTube Websites Microchip Video Conferencing IT Consultant Vulnerability Flexibility Wireless Technology Software as a Service Virtual Machines Computer Repair Data Protection eWaste Customer Relationship Management Co-Managed IT Professional Services Entertainment Virtual Assistant Hack Identity Theft Notifications Downtime Safety Unified Communications Google Docs Virtual Desktop Bluetooth Managed Services Provider Processor Experience Distributed Denial of Service Virtual Private Network Office Tips Tech Terms Private Cloud Memory Managed IT HIPAA Digital Current Events Solutions Disaster Politics Taxes Multi-factor Authentication Machine Learning Settings Integration Images 101 Lithium-ion battery Display Solid State Drive Saving Time Physical Security Computers Bitcoin Processors Employees Chromebook Drones Avoiding Downtime PowerPoint Telephone Administration Automobile Holidays Start Menu Downloads Presentation Computer Care Cooperation Specifications Excel How To Uninterrupted Power Supply Security Cameras Teamwork Webcam Trends Mobile Technology 2FA Phone System Public Speaking Data Storage Business Mangement Hypervisor Customer Resource management Devices Streaming Media Medical IT Tip of the week In Internet of Things Shopping Keyboard Tablets Fileless Malware Hacks Network Congestion SQL Server Gamification Company Culture Paperless Hard Drives Google Calendar Reliable Computing PCI DSS intranet Writing Licensing Supercomputer Telephone System Regulations Directions Backup and Disaster Recovery Smart Technology Wireless Gig Economy Virus Computer Accessories Shortcut Humor Internet Service Provider Environment Azure Motion Sickness Content Desktop Business Communications Heating/Cooling Accountants Windows XP Comparison Scalability Regulations Compliance Google Drive Social Networking Managed IT Service Electronic Medical Records Proactive IT Database Administrator Text Messaging Memes Bring Your Own Device Net Neutrality Corporate Profile Human Resources Knowledge Equifax Television Financial Data Telephony Employer Employee Relationship Health IT Music Tactics Supply Chain Hard Drive Disposal Risk Management IT Cabling Tablet G Suite Username Google Apps Startup Mouse Troubleshooting Freedom of Information Telework VoIP Tracking Navigation Microsoft 365 Addiction Workplace email scam Staffing Botnet Smartwatch Communitications IP Address Rental Service Procurement Micrsooft Web Server Mobile Security Legislation SharePoint News FinTech Flash Digital Payment User Tip IT Assessment Worker Evernote Business Growth Network Management Scams CES Telephone Systems Supply Chain Management Access Value Emails Business Owner Fake News Organization Time Management Cyber security Public Cloud Proxy Server Smart Devices Google Wallet Service Level Agreement Cables Computing Infrastructure Recovery Competition Banking Audit Messenger Remote Working Spyware Deep Learning Management Device security Wireless Headphones LiFi Microsoft Excel AI Entrepreneur Trend Micro File Sharing Business Metrics Electronic Health Records Tech Hosted Solution Transportation Going Green Point of Sale Business Cards Documents Digital Security Cameras Redundancy Application Books Cache Business Intelligence Wasting Time Error Society Modem Shortcuts Inbound Marketing Unified Threat Management Language eCommerce Workers Bookmark Surveillance Term Download Piracy Securty Videos Printing Domains Reading Monitors Managing Costs CCTV Visible Light Communication HTML Windows 8 SSID Nanotechnology Be Proactive Touchscreen Browsers Development Google Play Employer/Employee Relationships Computer Malfunction Upload Electronic Payment Software License Media Emergency Relocation Vendor Mangement Displays Virtual Machine Social Network Advertising Tech Support Screen Reader Workplace Strategies Reviews Work/Life Balance Optimization Samsung Data Analysis

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?