Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Colin Powell email hack shows passwords must be Trumped

by The Gurus
September 21, 2016
in Opinions & Analysis
Share on FacebookShare on Twitter

The plethora of data breach headlines have been reserved for multi-million pound organisations in recent months, but digital queasiness has established itself in a more personal and political manner as former US Secretary of State Colin Powell has seen the leak of his personal emails spreading like wildfire, says Dave Worrall, CTO at Secure Cloudlink. 

Worrall comments: “As politicians across the world race to delete their entire personal email history, in fear of their own politically (in)correct views being published online, it was revealed that an email containing disparaging remarks about US Presidential hopeful Donald Trump, had been leaked from an account registered to the former Secretary of State. While the content of those emails have sparked much debate, arguably the more critical issue must centre on the causes of these hacks. 

The explosion of businesses transacting online, social media sites, mobile devices and applications in the workplace has led to a huge appetite for stolen data. Hackers are not merely using stolen information for potential financial reward as it appears that they may be attempting to exploit political angles and sway American voters in the midst of a Presidential election. High profile celebrities are equally of interest to hackers after recent reports of top athletes’ data being stolen from the World Anti-Doping Agency’s (WADA) data storage system, including British Olympic stars Mo Farah, Justin Rose and Helen Glover.

Worrall continued: “Passwords are no longer fit for purpose, incidents like these are no longer just expected but inevitable under the current system, which is why a new solution needs to be elected.

“The severity of these hacks is scalable, depending on which political, financial or even medical context you look at them, but the regularity will only continue. Even though, Mr. Powell’s private email archive was protected by a password, which was probably selected with care and diligence and may have been complex and unique, the hack still occurred. Olympic medical records were still hacked and published online by a group known as the Fancy Bears. The appetite for data is not merely for financial purposes and there is a blanket fault as to why valuable information is becoming easily attained. 

“If a website is hacked, and the website doesn’t encrypt passwords then personal details as well as other high-risk data can be compromised. The main point is even if passwords are stored in an encrypted format, they can still be stolen and the encryption cracked. 

“Most current password security systems for business applications and websites are flawed. This is not the first time that politicians have been the target of such hacks, in the UK, Prime Minister Theresa May was targeted by an ISIS cyber-attack in 2015. This is very concerning, even if this latest US politician hacks were only to share views on the Presidential contenders, the fact that high profile athletes’ medical records have been so easily distributed is beyond intrusive. This will only continue and far more serious information could be leaked and found in the wrong hands in the future. 

“Instead of trying to find better solutions, governments have continued to operate under a system of password proliferation across multiple, often incompatible systems. The time is now right to rethink the entire concept of the password, each of us are unique, so we need a unique solution,” Worrall concluded.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Disposing Of IT Assets: How Not To Have Your Information Stolen On eBay

Next Post

Achieving business success by balancing business goals with security requirements

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information