Understanding password behavior key to developing stronger cybersecurity protocols

Passwords are still the weakest link in an organization’s network, as proven by the analysis of over 800 million breached passwords, according to Specops Software. The study found 88% of passwords used in successful attacks consisted of 12 charac… Continue reading Understanding password behavior key to developing stronger cybersecurity protocols

Young government workers show poor password management habits

Hybrid work has exposed another area of vulnerability, with 70% of government workers reporting they work virtually at least some of the time, according to Ivanti. The proliferation of devices, users, and locations adds complexity and new vulnerabiliti… Continue reading Young government workers show poor password management habits

Dormant accounts are a low-hanging fruit for attackers

Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising identities through methods such as bypassing MFA, hijacking sessions, or brute-forcing passwords, according to Oort. “The vast majority of success… Continue reading Dormant accounts are a low-hanging fruit for attackers