BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Motivation and Preparation

Posted January 13, 2011    Peter McCalister

You probably already saw last month that a group called Gnosis hacked over 1 million rows of data from Gawker, claiming the organization had some of the worst security they could have imagined. Gnosis gained access to their database in one day and even Gawker said in an internal memo that they were largely caught unprepared.

Now for your own entertainment, you should see the Wall Street who has your passwordJournal piece, which shows that over 3,000 Gawker users had the password “123456” and 2,000 had the password “password”. Everyone knows users often set poor passwords when left to their own devices, but this chart really brings it to life. Gawker clearly didn’t adequate requirements for more complex passwords.

It’s unclear how exactly Gnosis gained access to Gawker’s database. They mention that there were alot of vulnerabilities in outdated software. However what is clear is their motivation – vengeance – and why Gawker was so easy to hack – lack of preparation.

Leave a Reply

Additional articles

pbps-blog3

8 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted May 5, 2015    Scott Lang

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up.

Tags:
, , , , , , , ,
medicalbreach

The Magnitude of Cybersecurity Problems in United States Healthcare

Posted April 30, 2015    Dr. Mansur Hasib

Dr. Mansur Hasib discusses healthcare compliance and why healthcare records are far more valuable to the modern cyber criminal than any other data.

Tags:
, , ,
windows-10-logo-featured

What BeyondTrust Has to Say about Windows 10

Posted April 28, 2015    Morey Haber

Microsoft is on the verge of releasing its latest operating system, Windows 10. It has taken several nontraditional strides and also included some key components that we’re keeping our eyes on. Read on to learn what BeyondTrust has to say about Windows 10.

Tags:
, , ,