These Are The 32 Passwords You Really Shouldn’t Use Unless You Want To Get Hacked
Wednesday, October 30, 2019
The report also reveals that 42% of all the stolen passwords found were related in one way or another to the company name concerned or the breached resource itself. No wonder, then, that cybercriminals were able to "brute-force" these passwords, which means they could have a computer program try every dictionary word and common variations using numerical or special character replacements until the password was found.
"The disastrous situation with weak passwords may first appear to be easily addressable by standard technical means," says Ilia Kolochenko, CEO and founder of ImmuniWeb, "however, in light of the wide and dynamic spectrum of corporate and third-party systems handling confidential or sensitive data, this task becomes virtually unfeasible." This undoubtedly true as many organizations have no viable means to influence password policies of their IT providers and partners thereby exposing their corporate accounts to weak passwords and eventual compromises. "Two-factor authentication (2FA) is no panacea," Kolochenko says, "worse, as some researches have recently demonstrated, may undermine security if incorrectly implemented." So what does Kolochenko recommend by way of best practice? "Holistic visibility of your digital assets and data, coherent identity and access management (IAM) program covering third-parties and third-party risk mitigation strategy are essential to protect your organization," he says. Read Full Article
Silicon UK: City Of Johannesburg Threatened With Ransomware Data Release