Twitter hack: how bad was it?
On Wednesday, the social media platform Twitter suffered a cyber attack from bitcoin scammers. The hackers targeted high profile accounts such as Elon Musk, Kayne West and Barack Obama.
It is believed that the hackers gained access to an internal admin tool which therefore allowed them to gain such sensitive information and access.
Many questions are being asked of Twitter, how did hackers penetrate the security of such a high profile platform?
Twitter is the social media tool of choice for many high profile celebrities and politicians so cyber attacks like this are stress inducing for many. It is also the platform of choice for 330 million users, who are vulnerable to the cyber attack.
The case of the cyber attack has been handed over to the FBI to further the investigation to try and prevent this sort of cyber attack occurring again, however it is not as easy as that as scammers and hackers are forever finding new ways to steal sensitive information. Phishing attacks like this are all too common.
After this attack and to diminish any cyber threats in the future, Twitter is being urged to adopt end-to-end encryption for direct messages.
It is unarguable that direct messaging can contain some of the most sensitive information on the platform as we are all led to believe that it is safe and secure. However they are not as safe as Twitter would want us to think, they are vulnerable to internal compromise, because they are not end-to-end encrypted. End-to-end encryption will provide a robust extra layer of security through an internal safeguard. Messaging platforms such as Whatsapp and Facebook iMessage have already adopted end-to-end encryption.
However, it is relatively easy to trace the source of any Bitcoin transactions so it is hoped that the culprit will be caught and apprehended soon.
Twitter has confirmed that 130 high profile accounts were targeted in the attack however the social media giant insists that only a small portion of the targeted accounts were actually compromised.
It still is not clear what the hackers intentions were and if any possible other cyber attacks are on the horizon. It is also unknown the financial implications of the hack.
There is one question that is on all of our minds following this high profile attack; how can we remain cybersecure?
Cybersecurity will be at the forefront of all businesses right now as we are all on high alert.
One way to remain secure is to understand the data that your business collects and how you can keep that information secure, if your client’s sensitive data is leaked the impact could be detrimental to your business and its reputation.
In addition, use multiple authentication factors throughout your company to make sure no outside personnel gain unauthorized access to personal information.
You need to always assume that there is a vulnerability in every cyber situation, you are never one hundred percent safe from a vicious attack like this.
Tweet us at @TechnologyMagBC and let us know your opinions on the cyber attack, could it have been prevented?
Five9: the cloud software industry leaders acquired by Zoom
Five9 is the leading provider of cloud contact centre software. Driven by a passion for transforming contact centres into customer engagement centres of excellence, Five9 have a deep understanding of the cost and complexity of running a contact centre.
Founded in 2001, Five9 help contact centres of every size create powerful connections.
The company has over 20 years of cloud contact centre experience, reaches over 2,000 customers worldwide, and annually reaches over 7 billion customer interactions.
Built on a highly reliable, secure and scalable cloud platform, Five9 makes it easy to rapidly trial and deploy new services. Its software also future proofs businesses by supporting AI and other emerging technologies.
Utilising cloud capabilities for improved customer experience
Offering software that creates more successful customer interactions, Five9’s cloud contact centre software increases contact centre productivity. This is without the capital expense and maintenance costs of premise-based systems.
Built on flexible architecture that adapts to a company’s changing needs, Five9 customers benefit from a secure, reliable and scalable contact centre.
Five9’s cloud contact centre platform also gives customers access to an extensive ecosystem of partners. Its platform can be enhanced with leading customer relationship management, analytics, workforce management, performance management solutions and telephony providers.
By utilising cloud technology, Five9 customers have access to the latest capabilities through no-touch, non-disruptive real-time upgrades.
Five9’s recognition for industry-leading software
As a leading cloud contact centre software provider, Five9 has been recognised by leading industry publications and organisations for its success and innovative solutions.
For the fourth consecutive year, Five9 has ranked as a global leader for The Aragon Research Globe for Intelligent Contact Centres 2021.
Five9 was also one of only three providers to earn the MetriStar Top Provider award when evaluated as part of Metrigy’s global 2021-2022 Workforce Optimisation and Engagement research study.
Five9: Zoom’s first major acquisition
Zoom Video Communications has agreed to buy Five9 for about $14.7bn, marking the company’s first major acquisition.
This deal with Five9 will help expand the company’s Zoom Phone offering.
“I believe the combination of Zoom and Five9 will be a game-changer. Joining forces will create a transformative opportunity for two strong companies with complementary capabilities and shared values,” said Five9’s CEO, Rowan Trollope.
With Zoom’s reach and brand, the acquisition will help Five9 propel forward and help the company deliver on its goal of significant international expansion