Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Spotify Plays it Safe With Password Resets

In light of the recent spat of data breaches leading to login credentials from accounts for Myspace, Dropbox, and other online services, Spotify has taken measures to preserve their user security--despite not being victimized in a recent attack.

Many users of the music streaming service received a message informing them of the need to change their password. This was because Spotify had disabled their previous password credentials in order to protect their accounts from attack after analyzing the publicly-available password dumps from other recent hacks and cross-referencing those lists with their own compilation of user credentials. Anyone with a match was contacted with a link to reset their password, after Spotify had already changed it on their behalf.

While the actions of Spotify are commendable, it is important to remember that it is not every day that a company will go to such lengths to preserve the online security of its users, despite more and more companies implementing similar strategies as Spotify when news breaks of a breach. Safely protected from liability by disclaimers and terms of service, many (if not most) online services place any accountability for responsible password habits on their users.

As a result, it is imperative that you follow a few basic guidelines when selecting passwords for your own online profiles and accounts.

First and foremost, utilizing a unique password for each online account is the simplest method of keeping all of your accounts from being compromised due to a single website being hacked. After all, if your credentials are unique to each website, a hacker won’t be able to use what they stole from one to access another.

It’s also advisable to avoid using easily-guessed combinations or phrases. Using “password” is a cardinal sin of online security. The best passwords use random, case-sensitive combinations of letters, numbers and symbols (if possible).

By following these basic rules, you can be sure that--if an online account of yours is infiltrated--any others of yours will be secured.

For more tech tips, news, and tricks, be sure to keep checking back on the Direct Technology Group blog!

How Using the Wrong USB Cable Can Explode Your Dev...
Tip of the Week: How to Keep Your Wi-Fi Router Fro...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 31 May 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Google Hackers Productivity Malware Microsoft Network Security Data Innovation Software User Tips Smartphones Backup Business Miscellaneous Hardware Email communications Workplace Tips Computer Hosted Solutions Communication Mobile Devices Internet Small Business Android Productivity Business Management IT Support VoIP Smartphone Ransomware Upgrade Windows Cybersecurity Outsourced IT Windows 10 Browser Managed IT Services Social Media Tech Term Users Mobile Device Network Passwords Collaboration Microsoft Office Employer-Employee Relationship Apps IT Services Bandwidth Save Money Business Continuity Windows 10 Holiday Managed IT Services Automation Cloud Computing Facebook Office Marketing Internet of Things Chrome Data Backup Gadgets Quick Tips Phishing Saving Money Disaster Recovery Networking Server Gmail Managed Service Data Recovery Wi-Fi IT Support Router Information Alert Mobile Device Management Wireless Password Apple Health Applications Retail Computers Managed Service Provider VPN Business Intelligence Hacking App Virtualization Office Tips Access Control Mobility Remote Computing Settings Cybercrime Government Blockchain Patch Management Law Enforcement Analytics BDR iPhone BYOD Office 365 Application Remote Monitoring Recovery Excel Website Going Green Operating System Laptop Physical Security Data Management Spam Paperless Office Telephone Systems Politics Entertainment Biometrics WiFi Word History Mouse Value Data Breach Big Data Artificial Intelligence Battery VoIP Virus Bring Your Own Device Managed IT Service Social Engineering Environment Twitter Maintenance Humor Google Drive Compliance Lithium-ion battery Mobile Computing Workers Safety Cost Management Sports Telephone System Net Neutrality Wireless Charging Dark Web Mobile Office Information Technology Medical IT Human Resources Conferencing Cleaning Connectivity Voice over Internet Protocol Tip of the week Scam Robot DDoS Tech Support Batteries IT solutions Hard Drives Virtual Assistant Smart Technology Customer Relationship Management Data Protection Shadow IT Files Social Network How To Risk Management Customer Service Tech Terms Internet Exlporer Payment Cards Data storage End of Support Streaming Media Fax Server Current Events The Internet of Things PowerPoint Windows 7 Search Two-factor Authentication Business Technology Vulnerability Hosted Solution Remote Monitoring and Management Cortana Education RAM Telephony eWaste Printer Employee-Employer Relationship User Error Best Practice Processor Printer Server Company Culture HIPAA Healthcare Virtual Reality Managing Stress Hybrid Cloud Shortcut Tablet G Suite Data Security Employees PDF Reporting Memes Edge Running Cable Specifications Uninterrupted Power Supply Paste Benchmarks Video Games Outlook Websites Ink Cables File Management E-Commerce Entrepreneur Solid State Drive Social Networking Phone System IT Recycling User Profitability Tablets Black Market Dongle Managed Services Provider Lead Generation Meetings Webcam Payment Hiring/Firing Hard Disk Drive GDPR Hosted Desktop YouTube IT budget disposal Remote Support Content Filtering Worker Remote Control Alerts Eliminating Downtime Downloads Vendor instant Messaging Staffing Video Storage Firewall NarrowBand IT Management Distributed Denial of Service User Tip Spam Blocking Bitcoin Budget Bluetooth Work/Life Balance Wireless Internet Memory Downtime Technology Tips Trends Amazon WannaCry Avoiding Downtime Vulnerabilities Automobile OneNote Error Profiles Wireless Technology File Sharing Telecommuting Email Management USB Help Desk Backup and Disaster Recovery A.I. Cryptocurrency Programming Plug-In Distribution Hard Drive Windows Server 2008 R2 Touchscreen Computer Repair Chromecast Network Attached Storage Database User Security Movies Millennials Access Threats Certification Monitor SSD Internet exploMicrosoft Proactive IT Fleet Management Processors Licensing SharePoint Encryption Antivirus Gadget Taskbar Consultant Techology Microsoft Office 365 Computer Accessories IT Service Server Management Tactics Inventory Unified Communications Printers Scams Training Analyitcs Reputation Time Management Advertising Multi-Factor Authentication Spyware Travel Google Maps Notifications National Security Best Available HaaS Authentication Hacker Cameras Mobile Machine Learning Internet Explorer Mobile Security Project Management Spotify Security Cameras Customer Chrome OS Private Cloud Analysis Holidays HP Live Streaming Sales Personal Information Updates Flexibility Authorization Science Remote Telecommute Threat e-waste Microsoft Teams Voice over IP Multi-Factor Security Insurance Cabling Wearables WIndows 7 Public Cloud Unified Threat Management Virtual Private Network Document Management WhatsApp Botnet Knowledge SaaS Legal Troubleshooting Windows 8 Remote Workers Touchpad Data loss Printing Windows Media Player eCommerce Electronic Health Records Social Co-Managed IT Digital News Wearable Technology Managed IT Comparison Copy Display Update Covid-19 Staff Paper Online Shopping People Windows XP Bloatware Relocation