You might be wondering, if Google can have security issues, how do I protect my company?
Hackers revealed nearly 5 million Gmail account details and passwords on Bitcoin Security – a popular Russian website devoted to cryptocurrency. The leak became known after a user posted a link to the log-in credentials on Reddit frequented by hackers, professional and aspiring. Millions of Gmail users are being advised to change their passwords after a database with usernames and passwords was hacked and exposed on an internet site.
If you are concerned you may have been leaked follow this link to check your email https://lastpass.com/gmail/.
Some people who checked the list and found their Gmail addresses there reported that it contained an old password for them, and often a password that they had reused on multiple sites. Many of the passwords in question were likely taken from a website other than Google. The hacker has not been found. But hackers from Russia and Eastern Europe have been involved in a number of recent high-profile security lapses. The Gmail leak comes soon after two other major security breaches leaked on the same Bitcoin forum, which targeted Russian email service provider Mail.ru and search engine Yandex. Those two breaches affected nearly six million Internet users.
How do I protect myself?
Follow these 5 tips:
- Don’t use the same password for all your accounts. Many people use the same password for more than one purpose: Internet sign-ons, email, online banking and so on. It’s hard to remember multiple passwords and which you use for different accounts. However, if you use one password it makes things easy for hackers: If one password is revealed, they have the works. Your email is the one you should keep the most secure because it is the center for your online life. For example, if you forget the password to your bank account, you may be able to get a change-password link emailed to you. Well, if a hacker has already broken into your email, that person could reset your password and control your accounts.”
- Change your passwords and make them long. Altitude Unlimited recommends you create passwords which contain 12-14 characters with a combination of capital, lowercase letters, numbers and symbols. In addition you should change your password every month or two. Length of your password is more important than complexity. Hackers use programs that sort through combinations of letters and numbers at lightning speed. Longer passwords mean more work for hacking software – and hackers generally want quick results.
- Keep your system and software updated. Programs like Acrobat PDF reader, Microsoft and Java are heavily abused by hackers, and patches and new releases often contain upgrades that close avenues hackers use. Keeping these programs up to date is smart. Uninstall software you no longer use. Having fewer older programs means less opportunity for hackers.
- Install antivirus software. There are many good antivirus programs out there that protect you from about 95 percent of the problems. Firewalls provide another level of defense. Firewall protection also has to be kept up to date. These two security devices should be used in cooperation to best protect your system.
- Visit secure online sites. Look at the web address to know if the site is secure. Web addresses that begin with “http” use the basic Hypertext Transfer Protocol. But with “https,” the “s” on the end stands for “secure”: It authenticates the website and the Web server you’re communicating with.If you continue to struggle with your email accounts, including Gmail or just want to learn more about how to protect you and your business, feel free to contact Altitude Unlimited Advanced Technology Solutions. At Altitude Unlimited, we have network security consultants ready to help you navigate issues around anti-virus protection, distributed denial of service (DDos), data leak prevention (DLP) and other network security issues.
Our team can perform penetration testing among other security analyze solutions and help you to fully protect your business assets such as customer lists, credit card information and personnel information.