• Home
  • Vendor News
  • 10 Ways Hackers Exploit Passwords and Enterprise Credentials

10 Ways Hackers Exploit Passwords and Enterprise Credentials

Rangeforce Logo 400x160Non-compliant and compromised passwords represent some of the weakest links and greatest threats to online security for both individuals and organizations today. Hackers steal credentials for profit using various techniques ranging from online and offline brute force, dictionary, and keylogger attacks to scanning cloud resources for exposed and forgotten credentials left on publicly accessible servers.

 

While setting strict password policies and educating end-users on credential best practices may reduce the chances of a cyberattack, over 80 percent of hacking-related data breaches still involve brute force or the use of lost, stolen, or compromised passwords, according to the  2020 Verizon Data Breach Investigations Report. Moreover, new research from Carnegie Mellon University’s Security and Privacy Institute (CyLab) found that only one-third of users change their passwords following a data breach announcement. ...read more!

Ectacom HQ Munich

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn
Germany

ECTACOM Vienna

ectacom GmbH
Am Europlatz 2
A-1120 Wien
Austria

ECTACOM POLAND

+48 501 295 580
This email address is being protected from spambots. You need JavaScript enabled to view it.