Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Tuesday, 21 February 2017 / Published in Woo on Tech

On the clearance rack: one very (ab)used dotcom

Given all the reported breaches Yahoo has reluctantly publicized, not a small number of analysts and pundits were surprised that Verizon was still in discussions to purchase the beleaguered Internet company. Even more surprising was the amount of money being offered for what many see as a dying brand. It seems Yahoo can’t get sold quickly enough, as reports are now rolling in that Verizon’s engineers believe that some Yahoo systems may still be compromised. The cost of selling used and damaged goods? Another $350M off the table, bringing the current deal down to just under $4.5B.

What this means for you:

If you are still maintaining a Yahoo email account or hosting your website with their Small Business services, you should urgently consider migrating to a more reliable and reputable provider. Regardless of whether Verizon is somehow magically able to revive any of Yahoo’s flagging applications, the fact that Yahoo infrastructure might still be compromised after more than a year means your information is at high risk and Yahoo has not invested enough effort in making sure you are safe. If you don’t use any Yahoo services, their plight illustrates two valuable lessons:

  1. Breaches aren’t necessarily an “in and out” type of event – this isn’t a real-world burglary. If they are breaching your system for the purposes of stealing information, attackers will try to stay undetected for as long as possible, and will spread to as many systems as they can while keeping below the radar.
  2. A security incident, even if handled properly, can significantly damage the value of your company and brand, and if not handled correctly and diligently from the start, can continue to wreak havoc on your bottom line.
  • Tweet

What you can read next

Windows 8
If you want Windows 8, get it now!
Amazon Echo
Amazon Echo – Virtual assistant…and lawbreaker?
Windows 10 logo
MS loses lawsuit over unwanted Windows 10 upgrade

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Social security cards

    The Government Might Have to Reissue Every Social Security Number in America. What Does That Mean for Your Business?

    Two years ago, that sentence would have sounded...
  • Accountant working on accounting software on laptop

    What Accounting Firms Learn About Technology During Tax Season

    Tax season is the best stress test your technol...
  • Someone working on a tablet with AI

    Your Employees Are Already Using AI With Your Client Data

    You just don’t know it yet. I had a conve...
  • 3-2-1 countdown over computer language background

    The 3-2-1 Backup Rule Explained for Non-Technical Business Owners

    The 3-2-1 backup rule is one of those things th...
  • Microsoft365 vs Google

    Microsoft 365 vs. Google Workspace: Which One Actually Works for Law Firms?

    Many businesses, when trying to get their proce...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP