Written By Michael Vaughn And Presented By Charles Leaver Ziften CEO
Life is Too Short to Not Implement Endpoint Security.
Ashley Madison’s tagline is “Life is short. Have an affair.” It appears security falls a bit short at the company, nevertheless, as countless client records were publicized for the whole world to see in a current cyber attack. Publicly, there are just theories regarding who precisely infiltrated the outrageous operation. It could have been an insider. Other parties, for example the notorious hacking group Impact Team, are declaring success over the red-lettered organization. However what is apparent is the publicly-published list of 32 million user identities. Furthermore, CEO Noel Biderman lost his job, and the business is tackling an overwhelming variety of legal claims.
It has been discovered that bots were interacting with users, and the user population consisted of just a small number of females. In a farcical style, the website still mentions it received a “Trusted Security Award” and offers complete confidentiality for its users. Their claim of “Over 42,705,000 confidential members!” on the home page is as disgraceful as the service itself. The taken list of users is so easily available that third parties have actually already created interactive websites with the names and addresses of the revealed cheaters. Per Ashley Madison’s media page, they “right away implemented a comprehensive investigation utilizing leading forensics experts and other security professionals to determine the source, methodology, and scope of this event.” If Ashley Madison had actually been more proactive in their approaches of endpoint security, they could have potentially been notified of the cyber attack and stopped it prior to data could have been taken.
Advanced endpoint security and forensic applications – such as those provided by Ziften – could have possibly prevented this organization from the shame it has endured. Not only could Ziften have actually alerted security personnel of the suspicious network activity in the middle of the night of an attack, but it could have prevented a range of actions on the database from being carried out, all while letting their security group sleep a little easier. Life is too short to let security concerns keep you awake at night.