Written By Michael Vaughn And Presented By Chuck Leaver Ziften CEO
Life is Too Short to Not Install Endpoint Security.
Ashley Madison’s tagline is “Life is short. Have an affair.” It seems security falls a bit short at the company, nevertheless, as countless client records were publicized for the whole world to see in a recent breach. Openly, there are just theories regarding who exactly breached the scandalous operation. It could have been an inside job. Other possibilities, such as the infamous hacking group Impact Team, are declaring victory over the red-lettered organization. But exactly what appears is the publicly-published list of thirty two million user identities. Furthermore, CEO Noel Biderman lost his job, and the organization is dealing with an insurmountable number of law suits.
It has been found that bots were communicating with users, and the number of users included just a small number of women. In a farcical style, the website still specifies it was a winner of a “Trusted Security Award” and offers total confidentiality for its users. Their claim of “Over 42,705,000 confidential members!” on the homepage is as shameful as the service they offer. The taken list of users is so quickly accessible that 3rd parties have actually currently created interactive sites with the names and addresses of the exposed cheaters. Per Ashley Madison’s media page, they “instantly implemented an extensive investigation making use of premier forensics specialists and other security specialists to identify the source, methodology, and impact of this incident.” If Ashley Madison had actually been more proactive in their techniques of endpoint security, they could have potentially been notified of the cyber attack and stopped it prior to data could have been stolen.
Advanced endpoint security and forensic applications – for example those offered by Ziften – could have potentially prevented this company from the shame it has actually had to deal with. Not only could Ziften have informed security personnel of the suspicious network activity in the dead of night of an attack, however it could have avoided a range of actions on the database from being carried out, all while letting their security group sleep a little easier. Life is too short to let security concerns keep you awake at night.