SlideShare a Scribd company logo
1 of 17
What YOU Can Learn From eBay’s Security Breach
The word “eBay” necessitates no introduction. It’s a household brand, and a very successful one at that. The company
made $16 million in gross revenue in 2013, netting at about $2.8 million. In a highly-embarrassing series of events, the
company that also owns and operates PayPal had to stand (digitally) before its users and announce that it has been
hacked.
Read On PerfectCloud Blog
WHAT HAPPENED EXACTLY?
 The Security Breach
Between late February and early March, a still-
unidentified hacker managed to breach eBay’s
database, revealing passwords and personal
information of customers and employees.
It wasn’t until May that they recognized the
breach. So, for roughly three months, every single
account on eBay was as vulnerable as a gazelle in
the middle of a large grassy field!
eBay released a statement
assuring that users’ financial
data has not been
compromised, since this is
stored in encrypted format on a
separate repository.
What about the passwords
then?
 How Did eBay Respond To This?
How To Avoid Such Instance at Your Company?
 As an individual, it’s important to protect your identity from such breaches.
 Make strong and complicated passwords to make it really difficult for the hackers to
decrypt it.
 What if eBay’s financial database had been compromised? Considering eBay’s close
relationship with PayPal, you’d have been completely obliterated if you used both
services.
1
Avoid using the same password for two or more services at all costs. No matter what you
have to do to make sure you remember all of those passwords, do it and do it now.
Use Different Passwords For Different Services
Hint – Use a Single Sign-On service
2 Create Strong And Complicated Passwords
Don’t follow eBay’s advice when changing your password. It’s not going to save you from
even the simplest dictionary attack. Learn how to create strong passwords.
3 Find Out How Companies Store Your Data
Don’t rely on something just because it has encryption. Try to understand how the company
providing services to you stores its passwords and how it manages encryption and
decryption keys.
Lessons Companies Can Learn From eBay’s Slip-Up
 Use Multi-Factor Authentication
Your employees need multi-factor authentication. Your entire data infrastructure is as strong
as its weakest database. The more ways to authenticate you introduce, the better off you’ll be
when someone tries to bypass a password.
 Schedule Regular Audits
Do you audit your application usage? If you don’t, you have nothing to compare when a hacker
happens to breach an account in your company.
Don’t wait until a breach happens to tell everyone to reset their passwords. Remind your
employees and customers to regularly reset their passwords.
With staff that has access to sensitive information it should be done on a daily basis .
 Implement Strict Password Policies
eBay went out of its way in its statement to say that its “financial information is encrypted”.
Right. So, what about the rest? Don’t be that company.
 Encrypt All The Financial And Personal Data
 Stay Alert
Don’t take three months to detect a threat, especially one that’s already gaining control of your
database. Look for the signs of a breach. Check login times and see if something doesn’t add up
with what your provider is giving you.
Take a Few Precautions and Stay Protected From
Security Breaches
To understand the presentation in depth read the following article –
eBay’s Big “Whoops”: What Others Can Learn From It
If you have any queries or feedback, send an email to contact@perfectcloud.io

More Related Content

What's hot

Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Privacy Policy URL: Where To Add It (by TermsFeed)
Privacy Policy URL:  Where To Add It (by TermsFeed)Privacy Policy URL:  Where To Add It (by TermsFeed)
Privacy Policy URL: Where To Add It (by TermsFeed)termsfeed
 
Disclaimer Examples
Disclaimer ExamplesDisclaimer Examples
Disclaimer Examplestermsfeed
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber SecurityThrottleNet, Inc
 

What's hot (9)

Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Privacy Policy URL: Where To Add It (by TermsFeed)
Privacy Policy URL:  Where To Add It (by TermsFeed)Privacy Policy URL:  Where To Add It (by TermsFeed)
Privacy Policy URL: Where To Add It (by TermsFeed)
 
Disclaimer Examples
Disclaimer ExamplesDisclaimer Examples
Disclaimer Examples
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Basic Guide On Meta Robots
Basic Guide On Meta Robots Basic Guide On Meta Robots
Basic Guide On Meta Robots
 
Ebay
EbayEbay
Ebay
 
Secure coding checklist
Secure coding checklistSecure coding checklist
Secure coding checklist
 
Startups Security
Startups SecurityStartups Security
Startups Security
 

Viewers also liked

ITEC-610 Ebay Case Study
ITEC-610 Ebay Case StudyITEC-610 Ebay Case Study
ITEC-610 Ebay Case Studycnockaertgrad
 
Ebay - Presentation for Strategic Management class
Ebay - Presentation for Strategic Management classEbay - Presentation for Strategic Management class
Ebay - Presentation for Strategic Management classTheodore Le
 
Strategic mgt of Ebay
Strategic mgt of EbayStrategic mgt of Ebay
Strategic mgt of Ebayfarah naz
 
E bay 2011analystday_final2
E bay 2011analystday_final2E bay 2011analystday_final2
E bay 2011analystday_final2Marketingfacts
 
E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008
E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008
E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008Remedy Interactive
 
eBay Faces Opposition in China
eBay Faces Opposition in ChinaeBay Faces Opposition in China
eBay Faces Opposition in ChinaThomas Liquori
 
#fuse2015 - Finance & Risk Management on eBay
#fuse2015 - Finance & Risk Management on eBay#fuse2015 - Finance & Risk Management on eBay
#fuse2015 - Finance & Risk Management on eBayFuse Retail
 
Ebay OLAP Cube
Ebay OLAP CubeEbay OLAP Cube
Ebay OLAP Cubebfowles
 
Unlocking & sharing business databases amazon, ebay and google case study
Unlocking & sharing business databases   amazon, ebay and google case studyUnlocking & sharing business databases   amazon, ebay and google case study
Unlocking & sharing business databases amazon, ebay and google case studyprashanthc85
 
eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...Pouria Ghatrenabi
 
A cross-cultural analysis about the failure of eBay in Chinese market
A cross-cultural analysis about the failure of eBay in Chinese marketA cross-cultural analysis about the failure of eBay in Chinese market
A cross-cultural analysis about the failure of eBay in Chinese marketNawatat Suwansinpan
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachSkyhigh Networks
 
Cassandra Summit 2014: Apache Cassandra Best Practices at Ebay
Cassandra Summit 2014: Apache Cassandra Best Practices at EbayCassandra Summit 2014: Apache Cassandra Best Practices at Ebay
Cassandra Summit 2014: Apache Cassandra Best Practices at EbayDataStax Academy
 
Taobao vs. eBay - The battle within the Chinese eCommerce market
Taobao vs. eBay - The battle within the Chinese eCommerce marketTaobao vs. eBay - The battle within the Chinese eCommerce market
Taobao vs. eBay - The battle within the Chinese eCommerce marketYannick Pinkinelli
 
Strategic evaluation of e bay
Strategic evaluation of e bayStrategic evaluation of e bay
Strategic evaluation of e bayMita Hadi
 
Bow Tie methodology for Operational Safety & Risk Management
Bow Tie methodology for Operational Safety & Risk ManagementBow Tie methodology for Operational Safety & Risk Management
Bow Tie methodology for Operational Safety & Risk ManagementArthurGroot
 
Process Safety Kpi
Process Safety KpiProcess Safety Kpi
Process Safety KpiArthurGroot
 

Viewers also liked (20)

ITEC-610 Ebay Case Study
ITEC-610 Ebay Case StudyITEC-610 Ebay Case Study
ITEC-610 Ebay Case Study
 
Ebay - Presentation for Strategic Management class
Ebay - Presentation for Strategic Management classEbay - Presentation for Strategic Management class
Ebay - Presentation for Strategic Management class
 
Strategic mgt of Ebay
Strategic mgt of EbayStrategic mgt of Ebay
Strategic mgt of Ebay
 
E bay 2011analystday_final2
E bay 2011analystday_final2E bay 2011analystday_final2
E bay 2011analystday_final2
 
E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008
E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008
E bay at_the_applied_ergonomics_conference_-_march_2008___mar_01_2008
 
eBay Faces Opposition in China
eBay Faces Opposition in ChinaeBay Faces Opposition in China
eBay Faces Opposition in China
 
#fuse2015 - Finance & Risk Management on eBay
#fuse2015 - Finance & Risk Management on eBay#fuse2015 - Finance & Risk Management on eBay
#fuse2015 - Finance & Risk Management on eBay
 
Ebay OLAP Cube
Ebay OLAP CubeEbay OLAP Cube
Ebay OLAP Cube
 
Simmethod measuring and predicting alibaba, amazon and e bay risk and perform...
Simmethod measuring and predicting alibaba, amazon and e bay risk and perform...Simmethod measuring and predicting alibaba, amazon and e bay risk and perform...
Simmethod measuring and predicting alibaba, amazon and e bay risk and perform...
 
Unlocking & sharing business databases amazon, ebay and google case study
Unlocking & sharing business databases   amazon, ebay and google case studyUnlocking & sharing business databases   amazon, ebay and google case study
Unlocking & sharing business databases amazon, ebay and google case study
 
Tugas MS - Case Analysis eBay
Tugas MS - Case Analysis eBayTugas MS - Case Analysis eBay
Tugas MS - Case Analysis eBay
 
eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...eBay- a case study of organizational change underlying technical infrastructu...
eBay- a case study of organizational change underlying technical infrastructu...
 
A cross-cultural analysis about the failure of eBay in Chinese market
A cross-cultural analysis about the failure of eBay in Chinese marketA cross-cultural analysis about the failure of eBay in Chinese market
A cross-cultural analysis about the failure of eBay in Chinese market
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
eBay
eBay eBay
eBay
 
Cassandra Summit 2014: Apache Cassandra Best Practices at Ebay
Cassandra Summit 2014: Apache Cassandra Best Practices at EbayCassandra Summit 2014: Apache Cassandra Best Practices at Ebay
Cassandra Summit 2014: Apache Cassandra Best Practices at Ebay
 
Taobao vs. eBay - The battle within the Chinese eCommerce market
Taobao vs. eBay - The battle within the Chinese eCommerce marketTaobao vs. eBay - The battle within the Chinese eCommerce market
Taobao vs. eBay - The battle within the Chinese eCommerce market
 
Strategic evaluation of e bay
Strategic evaluation of e bayStrategic evaluation of e bay
Strategic evaluation of e bay
 
Bow Tie methodology for Operational Safety & Risk Management
Bow Tie methodology for Operational Safety & Risk ManagementBow Tie methodology for Operational Safety & Risk Management
Bow Tie methodology for Operational Safety & Risk Management
 
Process Safety Kpi
Process Safety KpiProcess Safety Kpi
Process Safety Kpi
 

Similar to eBay's Big "Whoops": What Others Can Learn From It

obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security BreachGaurav Dubey
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
security procedures
security procedures
security procedures
security procedures puffyarson5604
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)IOSR Journals
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfJose thomas
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 

Similar to eBay's Big "Whoops": What Others Can Learn From It (20)

obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security Breach
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
security procedures
security procedures
security procedures
security procedures
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
W make107
W make107W make107
W make107
 
E commerce
E commerceE commerce
E commerce
 
security procedures
security procedures
security procedures
security procedures
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
E commerce
E commerceE commerce
E commerce
 
Paypal.com ppt
Paypal.com pptPaypal.com ppt
Paypal.com ppt
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdf
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

eBay's Big "Whoops": What Others Can Learn From It

  • 1. What YOU Can Learn From eBay’s Security Breach The word “eBay” necessitates no introduction. It’s a household brand, and a very successful one at that. The company made $16 million in gross revenue in 2013, netting at about $2.8 million. In a highly-embarrassing series of events, the company that also owns and operates PayPal had to stand (digitally) before its users and announce that it has been hacked. Read On PerfectCloud Blog
  • 3.  The Security Breach Between late February and early March, a still- unidentified hacker managed to breach eBay’s database, revealing passwords and personal information of customers and employees. It wasn’t until May that they recognized the breach. So, for roughly three months, every single account on eBay was as vulnerable as a gazelle in the middle of a large grassy field!
  • 4. eBay released a statement assuring that users’ financial data has not been compromised, since this is stored in encrypted format on a separate repository. What about the passwords then?  How Did eBay Respond To This?
  • 5. How To Avoid Such Instance at Your Company?
  • 6.  As an individual, it’s important to protect your identity from such breaches.  Make strong and complicated passwords to make it really difficult for the hackers to decrypt it.  What if eBay’s financial database had been compromised? Considering eBay’s close relationship with PayPal, you’d have been completely obliterated if you used both services.
  • 7. 1 Avoid using the same password for two or more services at all costs. No matter what you have to do to make sure you remember all of those passwords, do it and do it now. Use Different Passwords For Different Services Hint – Use a Single Sign-On service
  • 8. 2 Create Strong And Complicated Passwords Don’t follow eBay’s advice when changing your password. It’s not going to save you from even the simplest dictionary attack. Learn how to create strong passwords.
  • 9. 3 Find Out How Companies Store Your Data Don’t rely on something just because it has encryption. Try to understand how the company providing services to you stores its passwords and how it manages encryption and decryption keys.
  • 10. Lessons Companies Can Learn From eBay’s Slip-Up
  • 11.  Use Multi-Factor Authentication Your employees need multi-factor authentication. Your entire data infrastructure is as strong as its weakest database. The more ways to authenticate you introduce, the better off you’ll be when someone tries to bypass a password.
  • 12.  Schedule Regular Audits Do you audit your application usage? If you don’t, you have nothing to compare when a hacker happens to breach an account in your company.
  • 13. Don’t wait until a breach happens to tell everyone to reset their passwords. Remind your employees and customers to regularly reset their passwords. With staff that has access to sensitive information it should be done on a daily basis .  Implement Strict Password Policies
  • 14. eBay went out of its way in its statement to say that its “financial information is encrypted”. Right. So, what about the rest? Don’t be that company.  Encrypt All The Financial And Personal Data
  • 15.  Stay Alert Don’t take three months to detect a threat, especially one that’s already gaining control of your database. Look for the signs of a breach. Check login times and see if something doesn’t add up with what your provider is giving you.
  • 16. Take a Few Precautions and Stay Protected From Security Breaches
  • 17. To understand the presentation in depth read the following article – eBay’s Big “Whoops”: What Others Can Learn From It If you have any queries or feedback, send an email to contact@perfectcloud.io