Written By Michael Vaughn And Presented By Chuck Leaver Ziften CEO
Life is Too Short to Not Execute Endpoint Security.
Ashley Madison’s tagline is “Life is short. Have an affair.” It appears security falls very short at the business, however, as countless consumer records were blasted out for the whole world to see in a recent cyber attack. Openly, there are only theories as to who precisely breached the scandalous operation. It could have been an insider. Other parties, such as the notorious hacking group Impact Team, are claiming success over the red-lettered organization. But exactly what appears is the publicly-published list of thirty two million user identities. In addition, CEO Noel Biderman lost his position, and the company is dealing with an overwhelming variety of legal claims.
It has been found that bots were communicating with users, and the user population consisted of just a small number of women. In a near-comedic fashion, the website still mentions it was a winner of a “Trusted Security Award” and ensures complete confidentiality for its users. Their claim of “Over 42,705,000 confidential members!” on the homepage is as disgraceful as the service itself. The taken list of users is so easily accessible that third parties have actually currently created interactive sites with the names and addresses of the exposed cheaters. Per Ashley Madison’s media page, they “instantly introduced a thorough investigation making use of leading forensics professionals and other security professionals to determine the origin, methodology, and scope of this event.” If Ashley Madison had been more proactive in their methods of endpoint security, they might have possibly been informed of the breach and stopped it before data might have been stolen.
Advanced endpoint security and forensic applications – for example those provided by Ziften – could have possibly saved this company from the humiliation it has had to deal with. Not only might Ziften have actually alerted security leads of the suspect network activity in the dead of night of a cyber attack, however it might have avoided a range of actions on the database from being performed, all while letting their security group sleep a little easier. Life is too short to let security concerns keep you awake at night.