• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News, Physical Security

Ubiquiti Tells Users to Change Passwords After Security Breach

The company said it recently became aware of unauthorized access to some IT systems hosted by an undisclosed third-party cloud provider.

January 12, 2021 Zachary Comeau Leave a Comment

Kaseya

Ubiquti, a maker of networking equipment and IoT devices, has notified its customers of a recent security breach.

In an email to customers that was posted on company forums, the company said it recently became aware of unauthorized access to some IT systems hosted by an undisclosed third-party cloud provider.

The company, a large provider of cloud-enabled devices like routers, network video recorders, cameras and access control systems, said there is no indication that unauthorized users accessed any user’s account.

Further, the company said it isn’t aware of evidence that the attacker has accessed databases that hose user data, but the company stopped short of confirming that this data wasn’t exposed.

“This data may include your name, email address, and the one-way encrypted password to your account (in technical terms, the passwords are hashed and salted),” the company said.

“The data may also include your address and phone number if you have provided that to us.”

Read Next: IBM Study: Average Cost of Data Breach $3.86M

As a precaution, the company is urging users to change their password for UI.com and on any other websites where the same password user ID or password are used.

Users are also urged to enable two-factor authentication on Ubiquti accounts.

“We apologize for, and deeply regret, any inconvenience this may cause you,” the email says. “We take the security of your information very seriously and appreciate your continued trust.”

Here’s the full message:

We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider. We have no indication that there has been unauthorized activity with respect to any user’s account.

We are not currently aware of evidence of access to any databases that host user data, but we cannot be certain that user data has not been exposed. This data may include your name, email address, and the one-way encrypted password to your account (in technical terms, the passwords are hashed and salted). The data may also include your address and phone number if you have provided that to us.

As a precaution, we encourage you to change your password. We recommend that you also change your password on any website where you use the same user ID or password. Finally, we recommend that you enable two-factor authentication on your Ubiquiti accounts if you have not already done so.

We apologize for, and deeply regret, any inconvenience this may cause you. We take the security of your information very seriously and appreciate your continued trust.

Thank you,

Ubiquiti Team

 

 

 

 

Tagged With: Ubiquiti

Related Content:

  • Zoom macOS Update Zoom on macOS Devices Now
  • DDoS, NETSCOUT Arbor Insight NETSCOUT Launches Arbor Insight for Enhanced DDoS Prevention
  • AWS Private 5G Amazon Launches AWS Private 5G For Connected Environments
  • Mindbody wellness tech WalkMe Mindbody Enlists WalkMe to Drive Digital Transformation

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.