Yet Another Data Breach – LivingSocial Gets Hacked

Default Blog Top Image
by Paul Griffin Posted on May 03, 2013

data-breachLivingSocial certainly didn’t have the best week this week after a massive data breach occurred last Friday, revealing the names, email addresses, encrypted passwords and birth dates of more than 50 millions users. I imagine that while the company is certainly thinking about how to move forward after this type of public transgression, it is also trying to figure out where things went wrong.

This leads me, once again, to stress that in addition to using a driver that encrypts passwords that are sent across a network, you must also ensure that your database offers an encryption option. If you only use one or the other, a data breach such as the one at LivingSocial may not be far out of the realm of possibilities. It’s only when you employ both simultaneously that you can – with confidence – be sure that your customers’ data is secure.

Progress DataDirect drivers not only encrypt all user passwords across your network, but also support Kerberos authentication. This bolsters system security, eliminates the need for users to log in separately for each account and reduces the possibility of a data breach. Let LivingSocial be a cautionary tale, and encrypt your data moving forward!


Paul-Griffin
Paul Griffin
View all posts from Paul Griffin on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
More from the author

Related Tags

Related Articles

Progress DataDirect Now Connects to Denodo
Progress DataDirect has added Denodo, a data virtualization software platform, to its catalog of connectors.
What Is the Difference Between SSO, 2FA and MFA?
Learn about the three main security protocols and their differences: Single Sign-On (SSO), Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA).
Website & App Security: What You Need to Know to Protect the Products You Build
What can you do to ensure that you’re not setting up your clients for failure or their end users for trouble? In this post, we’ll look at the four parts of a digital product that are the most vulnerable along with what you can do to secure those weak spots.
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation