![]() Unencrypted data included basic customer account information and related metadata including company names, end-user names, website URLs, billing addresses, email address, telephone numbers and IP addresses from which customers were accessing the LastPass service.”Īs we’ll explain further, this suggests some best practices going forward. ![]() “ Encrypted data within the Vault includes user names, passwords, associated login notes and secure notes. According to a moderator in their customer support forum: LastPass has said that the breach exposed unencrypted customer data, including web URLs and email addresses, as well as encrypted copies of customer passwords and secure notes. Nevertheless, there are best practices which apply here, and which you can perform periodically, to improve the security of your data now and in the future. As long as you used a reasonably strong master passphrase ( in accordance with LastPass recommendations) to s ecure your Last P ass account, it is unlikely that there is any immediate risk to your data. Is there anything I need to do right now?įor most people, not in the short term. It simply reflects what we know about the situation and about how the company has handled this, and other, events. ![]() Please note that nothing in this post is intended to be an endorsement of any particular service. We have received questions from some users about this issue, and this post attempts to answer some of them. LastPass notified customers in November 2022 that an attacker had gained access to customer data. Does this mean LastPass shouldn’t be trusted?.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |