Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Tuesday, 21 February 2017 / Published in Woo on Tech

On the clearance rack: one very (ab)used dotcom

Given all the reported breaches Yahoo has reluctantly publicized, not a small number of analysts and pundits were surprised that Verizon was still in discussions to purchase the beleaguered Internet company. Even more surprising was the amount of money being offered for what many see as a dying brand. It seems Yahoo can’t get sold quickly enough, as reports are now rolling in that Verizon’s engineers believe that some Yahoo systems may still be compromised. The cost of selling used and damaged goods? Another $350M off the table, bringing the current deal down to just under $4.5B.

What this means for you:

If you are still maintaining a Yahoo email account or hosting your website with their Small Business services, you should urgently consider migrating to a more reliable and reputable provider. Regardless of whether Verizon is somehow magically able to revive any of Yahoo’s flagging applications, the fact that Yahoo infrastructure might still be compromised after more than a year means your information is at high risk and Yahoo has not invested enough effort in making sure you are safe. If you don’t use any Yahoo services, their plight illustrates two valuable lessons:

  1. Breaches aren’t necessarily an “in and out” type of event – this isn’t a real-world burglary. If they are breaching your system for the purposes of stealing information, attackers will try to stay undetected for as long as possible, and will spread to as many systems as they can while keeping below the radar.
  2. A security incident, even if handled properly, can significantly damage the value of your company and brand, and if not handled correctly and diligently from the start, can continue to wreak havoc on your bottom line.
  • Tweet

What you can read next

Windows 10
Microsoft breaks millions of webcams with Win 10 update
blackberry-storm.jpg
Future of BlackBerry Uncertain
ID-10021674.jpg
Cross-platform Chat App May Be Dodgy

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Employees in a meeting, AI is present

    Shadow AI – The Security Risk Already Inside Your Company

    Your employees are using unauthorized AI tools ...
  • Email Credential Theft is Still Hot

    You would think that with all the money pouring...
  • Misleading Signs

    How to live in a Post-Truth World

    In 2016, the Oxford Dictionary named “pos...
  • two ceramic smiling poop emojis on a white background

    Scatological Devolution

    [Warning: there is some slightly foul language ...
  • Can you tell the difference?

    I’ve been working in tech long enough to rememb...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP