Story image

Dell.com customers urged to change passwords after breach

30 Nov 2018

Dell is asking all of its Dell.com customers to change their passwords after it detected ‘unauthorised activity’ on its network earlier this month.

On November 9, Dell detected and disrupted the unauthorised activity on its network. That activity attempted to steal customer information from Dell.com, including names, email addresses and hashed passwords. Credit cards and other confidential information were not affected.

“Though it is possible some of this information was removed from Dell’s network, our investigations found no conclusive evidence that any was extracted. Additionally, Dell cybersecurity measures are in place to limit the impact of any potential exposure. These include the hashing of our customers’ passwords and a mandatory Dell.com password reset,” Dell says.

As soon as the company detected the breach, it immediately started an investigation and deployed countermeasures. Dell also recruited a digital forensics firm to conduct an independent investigation and communicated the findings to customers after the firm had completed its investigation.

“We have cybersecurity measures in place that limit the impact of any potential exposure, including the hashing of customers’ passwords,” the company states. 

“Out of an abundance of caution, we proactively reset Dell.com customers’ passwords to further protect customers and their accounts.”

“This includes encouraging customers to change passwords for other accounts if they use the same password for their Dell.com account.”
The company says it is committed to doing everything possible to protect customer data, including more investment in IT networks and security.

“While we continue to do all that we can, please change your password the next time you log-in to Dell.com if prompted to do so (you will be prompted if you haven’t changed it recently). And if you use the same or similar passwords on other online services, we recommend you also set new passwords for those accounts.

Dell offers a few tips for creating a secure password:

•    Passwords should contain a minimum of 8 characters, using a mix of uppercase and lowercase letters and at least one number.

•    Don’t use any words that can be associated with you such as a family name or address

•    Choose a reminder sentence about your life and create a password as the first letter of each word, so “I drink 2 cups of Tea With Honey every day!” becomes “id2coTWHed!” (Customers should not use this same example)

•    Keep in mind that it’s never a good idea to use the same password across multiple sites.
 

Google doubles down on hybrid cloud strategy
CSP is a platform that aims to simplify building, running, and managing services both on-premise and in the cloud.
In ongoing cloud war, Google to acquire data migration specialist
Google is currently behind AWS and Microsoft in the cloud battle, and it would seem this play is an attempt to claw some ground back.
Interview: CyrusOne’s new Europe president on aggressive expansion
In this exclusive interview Tesh Durvasula shares how the company plans to have a Europe data centre portfolio providing nearly 250 MW by the year’s end.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Pure Storage expands enterprise data management solutions
It has integrated StorReduce technologies for a cloud-native back up platform, and expanded its data fabric solution for cloud-based applications.
HPE launches new real-time processing edge platform
The platform is said to help communication service providers (CSPs) to capitalize on data-intensive, low-latency services for media delivery, connected mobility, and smart cities.
‘Digital twins’ entering mainstream use sooner than expected
The term ‘digital twin’ may sound foreign to some, but Gartner says it is rapidly becoming established among modern organisations.
Infinera launches new ‘disruptive’ network architecture
The new end-to-end network architecture is said to enable instantly scalable, self-optimizing networks that adapt to the demands of specific users and applications.