• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

150,000 Security Cameras Hacked Because of One Password


By VARINDIA - 2021-03-30
150,000 Security Cameras Hacked Because of One Password

This week, news broke that hackers infiltrated Verkada, a Silicon Valley security company specializing in camera systems. The “hacktivists” had access to live camera feeds of nearly 150,000 security cameras from some 24,000 customers, along with internal financial documents, customer lists, and the complete database of camera recordings.

 

Affected customers included “schools, offices, gyms, banks, health clinics and county jails […] churches, volunteer fire departments, hotels, sports bars, rehabilitation centers and children’s foster-care homes, as well as major tech companies such as Cloudflare” and Tesla, according to the Washington Post.

 

And it was all because of one password.

 

In interviews, the hackers admitted that they stumbled across an admin username and password on the web. It was an “easy” hack: they tried the credentials, they were valid, and the hackers unlocked access to a sensitive data trove. 

 

In the cybersecurity community, the breach has raised questions about data security, privacy and surveillance. But another critical takeaway is that sometimes, mundane things like a leaked password can be a company’s Achilles heel.

 

How corporate passwords get leaked

 

It’s a lot easier than you think for hackers to use stolen passwords to gain corporate networks and accounts access. Large-scale breaches - like the LinkedIn breach in 2012 of 170 million credentials - can have long-lasting and devastating security effects. Hackers simply obtain the list of leaked credentials, often on the dark web. They then use automated tools to start testing those credentials or carry out targeted attacks. 

 

For example, if they know the LinkedIn password of the CEO of a specific company, they’ll start trying the same password to break into the CEO’s corporate email account. From there, the hackers can escalate privileges and expand their access within the company’s network.

 

Security breaches may go undetected for months, or even years. Many people don’t change passwords even when data breaches are publicized. That’s why any password reuse by any employee can put a company in jeopardy. A leaked account by a random website – maybe even one for personal use, outside the office – can still give hackers a way in when the employee uses the same password everywhere.

 

Steps companies should take today

 

Strong passwords are critical to an excellent cybersecurity strategy. It sounds simplistic, but good passwords provide an essential first layer of defense against attacks. Every password used by every employee for every company login should be a unique, generated string of random characters. A password manager gives IT the tools to enforce strong password policies while simplifying day-to-day password-related tasks for employees, so better passwords are the norm. 

 

Companies should also explore strategies for going beyond passwords. Single sign-on can eliminate password use and take a policy-based approach that restricts access to the right people at the right time from approved devices. Multifactor authentication adds another critical layer of security. Suspicious logins require that a user prove who they are before granting access to company accounts or data by leveraging contextual data and biometrics. Combining access and authentication technology gives IT visibility into every login while simplifying the employee login experience.

 

A data breach can be devastating. At this time, it’s unclear what the financial and reputation damage to Verkada will be. But their story should be a reminder to other businesses of the need to be proactive rather than reactive when it comes to secure authentication. Companies must prioritize password security and robust authentication protocols. A layered, policy-driven approach to cybersecurity can slow down any would-be attackers and significantly reduce the risk of a breach. Learn more about how LastPass can help.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.