• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
take an offensive approach to password security by continuously monitoring

Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords

You are here: Home / General Cyber Security News / Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords
October 11, 2023

Passwords are at the core of securing obtain to an organization’s data. Nevertheless, they also appear with security vulnerabilities that stem from their inconvenience. With a growing record of credentials to retain track of, the average end-user can default to shortcuts. Alternatively of creating a powerful and one of a kind password for each and every account, they vacation resort to uncomplicated-to-bear in mind passwords, or use the same password for every single account and software.

Password reuse is both equally prevalent and risky. 65% of consumers admit to reusing their qualifications throughout numerous sites. A further assessment of id exposures amongst workforce of Fortune 1000 organizations uncovered a 64% password reuse rate for uncovered qualifications. Pair these conclusions with the reality that a huge the vast majority (80%) of all information breaches are sourced from lost or stolen passwords, and we have a significant dilemma. In limited, a breached password from a person program can be applied to compromise an additional. So, what does this all indicate for your group?

The actual risk of password reuse

Password reuse is considerably extra consequential for small business accounts than personal accounts. If an employee’s reused qualifications get compromised, even for a straightforward efficiency software, a cybercriminal could conveniently exam it against other purposes and devices that could grant them access to sensitive information like customer information and facts, enterprise trade secrets and techniques. They could also halt operations by deploying ransomware all over the network — putting even a lot more IT assets at risk.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Regretably, a lot of corporations lack a detailed procedure to avert password reuse, like blocking the use of weak, breached, or high-likelihood passwords. Generally situations, action is not taken till it is too late.

Mitigating the security implications of password reuse

Finish-consumers are not probable to employ password most effective techniques on their possess. For the sake of advantage, they will:

  • Use popular character composition designs
  • Reuse the similar password throughout various accounts (even across personalized and function)
  • Go on to use compromised passwords until they are pressured to adjust them

Every single of the previously mentioned places your organization in a vulnerable placement. You ought to put into action security tools and guidelines that solve the password reuse difficulty. Sad to say, the most prevalent answer even now leaves us susceptible.

Multi-factor authentication is not ample

Multi-factor authentication (MFA) adds a security layer by requiring people to post an more verification method like a PIN or thrust notification. It can help protected an account inspite of a password compromise due to that further factor necessary.

The issue: MFA is a excellent way to add security to shield end-consumers. But there are nonetheless several means attackers can bypass authentication methods, specifically if they already have the user’s password.

Solving the password reuse security hole with Specops Password Policy

Specops Password Plan gives IT administrators the capacity to enforce more robust password guidelines in Active Directory environments and mitigate the risk of reused and compromised passwords.

Cybersecurity

Specops Password coverage with Breached Password Protection allows you to block about 4 billion exclusive recognised and compromised passwords. With the steady compromised scanning feature activated, passwords are constantly checked from the persistent risk of password reuse. The Breached Password Protection data is also constantly up to date with passwords gathered by our honeypot network method and newly found out password leaks.

Implement strong password security with Specops Software program

In spite of their requirement to keep account security, passwords depart IT sources susceptible. Really don’t wait around right up until soon after a breach to implement stronger passwords, get hold of Specops Software package nowadays. See how your group can implement more robust password insurance policies, check out for breached passwords 24/7, give safe authentication methods and a lot more.

Observed this posting attention-grabbing? Adhere to us on Twitter  and LinkedIn to study additional distinctive information we article.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «microsoft releases october 2023 patches for 103 flaws, including 2 Microsoft Releases October 2023 Patches for 103 Flaws, Including 2 Active Exploits
Next Post: U.S. Cybersecurity Agency Warns of Actively Exploited Adobe Acrobat Reader Vulnerability u.s. cybersecurity agency warns of actively exploited adobe acrobat reader»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.