pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Lesson’s Learned from the Ashley Madison Hack

hackThe most recent hack to make the headlines is the Ashley Madison hack. It is making news mainly because of the sensational nature of the sight to begin with and the sordid details that are available regarding its membership base. However, there are some lessons to be learned regarding security for this as well. The following are three important lessons to be learned from this hack and what your business can do to prevent it from happening.

1. Verify the actual integrity of your data security

You probably tell clients their information is secure, but just about every company makes that claim. One of the biggest mistakes made by Ashley Madison was the failure to know if its data was truly secure. The company publically lauded its security, but it now seems like those claims were rather hollow. In fact, it appears as if no one at Ashley Madison knew a whole lot about its security practices until it was too late.

Don’t simply pass off your business’s security to the IT department. Being involved will allow you to see how it works. You don’t need to be a tech expert to understand how your data is being secured. Your security provider, whether it be in-house or via a managed services provider, should be able to explain security practices in layman’s terms. This will allow you to ask questions and be proactive because chances are if you see a weakness, others will notice it as well.

2. Employees and their surfing habits can be your biggest threat

Another takeaway from this scandal was the fact many employees, both from private companies and government offices, were using business email accounts to sign-up for Ashley Madison and office Internet connections to access the site. Putting the ethical questions aside for a moment, public sentiment is undoubtedly negative and companies with employees who used Ashley Madison at work have been exposed to the scandal’s backlash.

By placing the appropriate email and Internet security solutions in place at your business, you can reduce the amount of risk your company is exposed to by employees. No one really wants to put restrictions on their employees’ Internet and email access, but it is important to be smart. Being connected to scandals like this can bring unwanted publicity to your business. Worst of all, your employees might not even realize they are putting your company in harm’s way when they access this type of content at work.

3. Accept that there may be data loss

As the Ashley Madison case has shown us, massive data theft or loss can be the end of your business. When clients trust your business with their data, they are confident in your ability to protect it. Of course, things do happen and if your data does go missing, it’s important to have a plan of action ready. While it’s unlikely your company’s data breach is unlikely to garner the attention of Ashley Madison, it means a whole lot more to you, your company and your employees. Just because your company isn’t big doesn’t mean it’s invincible.

A disaster recovery plan can help your company ensure it has backups and even backups of your backups. If you believe your data has been stolen by hackers, it is important to act immediately. You’ll need to quickly assess what information has been stolen and inform the appropriate parties so they can take the necessary steps to protect themselves. From there, you will want to re-secure your company closing any security loopholes that have been found. Finally, access your backups and make sure your business continues to operate as close to normal during the crisis.

Filed Under: Articles

Latest Articles

Transfer VHS to DVD Method

Transferring  a VHS tape  to a DVD sounds like something hard to do but in reality it's not.  It's basically taking what is on tape and converting it to a digital file that can be burned onto a DVD or any media source for backup and preservation purposes. The best way to preserve and copy your … [Read More...]

The Virtual Olympics: What Games Will Be Played In The Coming Years?

Gaming is a huge and diverse market. There is the hugely popular online casino market, in addition to mobile, console, and PC. There are well-established esports titles across the globe, all of which have organised leagues and events spanning the vast space, culminating in World Cups or their … [Read More...]

BIOS Reasons

In the past there have been compelling reasons to upgrade your BIOS, such as for Y2K compliance or to support high capacity hard drives that older BIOS chips simply wouldn't recognise. These days the rate of technological development is such that motherboard manufacturers release new BIOS … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

AMD’s Mobile Duron technology guide

Until 2001 all of AMD's mobile CPUs had been based on the K6 design. The company's Athlon/Duron family of processors had … [Read More...]

Be Productive With Your iPads With Keyboard Cases

When it comes to portability, lightness and convenience, the tablets are the best in these categories. However, if you are on the productive side, the … [Read More...]

The Flexible PDF is King of Sharing

PDF stands for Portable Document Format, a file format that originated in print publishing as a tool for proofing print jobs before sending them to … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors