{"id":4693,"date":"2012-08-01T18:53:00","date_gmt":"2012-08-01T18:53:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/breach-report-dropbox-implements-new-security-measures\/"},"modified":"2012-08-01T18:53:00","modified_gmt":"2012-08-01T18:53:00","slug":"breach-report-dropbox-implements-new-security-measures","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/breach-report-dropbox-implements-new-security-measures\/","title":{"rendered":"Breach Report: Dropbox Implements New Security Measures"},"content":{"rendered":"<p>Dropbox, an online platform used for sharing data between&#13;<br \/>\ndevices, was recently confirmed breached after a two-week investigation. After&#13;<br \/>\nusers began receiving spam-like emails, <a href=\"http:\/\/news.cnet.com\/8301-1009_3-57483998-83\/dropbox-confirms-it-was-hacked-offers-users-help\/\">Dropbox<\/a>&#13;<br \/>\nfound that hackers accessed usernames and passwords through a third party. They&#13;<br \/>\nbelieve the spam started once the hackers got access to a Dropbox employees information.&#13;<br \/>\nA newly released <a href=\"http:\/\/blog.dropbox.com\/index.php\/security-update-new-features\/\">blog<\/a>&#13;<br \/>\non the companys site outlines their advanced efforts to prevent this from&#13;<br \/>\nhappening in the future.<\/p>\n<p><!--StartFragment--><\/p>\n<p>While the company has done a great job at being completely&#13;<br \/>\ntransparent about the issue, they are facing a major issue that many online&#13;<br \/>\nsites and businesses are dealing with. Its the same idea of getting a security&#13;<br \/>\nsystem installed AFTER your house has been broken into. While its great now,&#13;<br \/>\nit would have been even better BEFORE. Many companies think that <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/\">preventing&#13;<br \/>\nonline fraud<\/a> may be difficult or costly to implement, but compared to the&#13;<br \/>\ncosts and complications of <em>fixing<\/em>&#13;<br \/>\nfraud, its well worth the conversation. Taking the time to implement a fraud&#13;<br \/>\nprevent strategy can save businesses a great deal of grief later down the road.&#13;<br \/>\nWhile the steps that <a href=\"http:\/\/mashable.com\/2012\/08\/01\/dropbox-brief\/\">Dropbox<\/a>&#13;<br \/>\nand other companies are taking, such as sending reminders to change passwords&#13;<br \/>\nand logging account activity can help, they do not stop hackers that much more.&#13;<br \/>\nPasswords are becoming less and less important as Internet hackers get smarter&#13;<br \/>\nand as online activity increases.<\/p>\n<p>Verifying and authenticating a persons identity before&#13;<br \/>\nallowing them access to an online account can help stop hackers in their&#13;<br \/>\ntracks. Even with someones username, password, and even address and credit&#13;<br \/>\ncard number, <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identifraud\/\">EVS<\/a>&#13;<br \/>\ncan prevent a thief from moving any further. Authentication is key in a time&#13;<br \/>\nwhere faceless transactions and logins are happening every second of every day.&#13;<br \/>\nPreventing fraud may be something new to your company, or something you may be&#13;<br \/>\nlooking into, but it well worth the cost to avoid a breach.<\/p>\n<\/p>\n<p>[Contributed by EVS Marketing]<\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dropbox, an online platform used for sharing data between devices, was recently confirmed breached after a two week investigation. After users began receiving spam like emails, Dropbox found that hackers accessed usernames and passwords through a third party. They believe<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,37],"tags":[],"class_list":["post-4693","post","type-post","status-publish","format-standard","hentry","category-fraud-prevention","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4693"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4693\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}