Jump to content

Database Breach - An Update


Dark0ne

Recommended Posts

  • Replies 547
  • Created
  • Last Reply

Top Posters In This Topic

In response to post #31737390.


  Reveal hidden contents


A very good point. For a long time, niether did I (untill teh jobcentre told me that it was essential for getting a job)

I hate it when places do this.
Link to comment
Share on other sites

In response to post #31726705. #31727240 is also a reply to the same post.


  Reveal hidden contents


Are you using any sort of cookie manager by chance?
Link to comment
Share on other sites

  On 12/9/2015 at 12:10 PM, Dark0ne said:

 

In response to post #31709715.

 

 

 

  Reveal hidden contents

Because sending an email to 10 million people would take us about 6-12 months, and have us flagged in every SPAM database on the planet. It's likely by the time the script got around to your email being sent, you wouldn't have even received it.

 

 

I was watching TheTech Guy on Twit.tv with Leo Laporte

He suggested using Mail Chimp for sending out mass emails to users (http://mailchimp.com/).

The problem -- that the caller had --

Was how do they send out newsletters to multiple users (without getting flagged as a spammer)? He was using Gmail to do it.

 

-- this might be something to take a look at if you have to email a lot of people on the site.

 

PS: they have a free service: Up to 2,000 subscribers and 12,000 emails per month

If you wanted to send more than that -- you could look at their pricing.

 

However, for the purpose of emailing users to recommend a password reset -- you might be able to try the free service for emailing every once in a while

Link to comment
Share on other sites

In response to post #31737390. #31742135 is also a reply to the same post.


  Reveal hidden contents


Then you have bigger problems than worrying about your Nexus account. It's 2015, and even if you're a luddite, having a phone has become a social and workplace necessity. Maybe get on that.
Link to comment
Share on other sites

  • Community Manager
In response to post #31737390. #31742135, #31743025 are all replies on the same post.


  Reveal hidden contents


2FA is completely optional anyway.
Link to comment
Share on other sites

Thank you for your swift actions in both tracking down the facts and notifying your users even when the matter was still uncertain. An open and honest admission of the known facts and what you were doing and considering to address the potential breach is the best way to maintain customer confidence. I wish more companies would follow examples like yours in dealing with security breaches.
Link to comment
Share on other sites

In response to post #31699195. #31709590, #31710865, #31717215, #31727420, #31727725, #31727755, #31735675, #31736475, #31737125 are all replies on the same post.


  Reveal hidden contents


+1
Link to comment
Share on other sites

In response to post #31699195. #31709590, #31710865, #31717215, #31727420, #31727725, #31727755, #31735675, #31736475, #31737125, #31745975 are all replies on the same post.


  Reveal hidden contents


Well said. May the modding goodness continue.
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

×
×
  • Create New...