Total Tests:

These Are The 32 Passwords You Really Shouldn’t Use Unless You Want To Get Hacked

By Davey Winder for Forbes
Wednesday, October 30, 2019

The report also reveals that 42% of all the stolen passwords found were related in one way or another to the company name concerned or the breached resource itself. No wonder, then, that cybercriminals were able to "brute-force" these passwords, which means they could have a computer program try every dictionary word and common variations using numerical or special character replacements until the password was found.

"The disastrous situation with weak passwords may first appear to be easily addressable by standard technical means," says Ilia Kolochenko, CEO and founder of ImmuniWeb, "however, in light of the wide and dynamic spectrum of corporate and third-party systems handling confidential or sensitive data, this task becomes virtually unfeasible." This undoubtedly true as many organizations have no viable means to influence password policies of their IT providers and partners thereby exposing their corporate accounts to weak passwords and eventual compromises. "Two-factor authentication (2FA) is no panacea," Kolochenko says, "worse, as some researches have recently demonstrated, may undermine security if incorrectly implemented." So what does Kolochenko recommend by way of best practice? "Holistic visibility of your digital assets and data, coherent identity and access management (IAM) program covering third-parties and third-party risk mitigation strategy are essential to protect your organization," he says. Read Full Article


Book a Call Ask a Question
Close
Talk to ImmuniWeb Experts
ImmuniWeb AI Platform
Have a technical question?

Our security experts will answer within
one business day. No obligations.

Have a sales question?
Email:
Tel: +41 22 560 6800 (Switzerland)
Tel: +1 720 605 9147 (USA)
*
*
*
Your data will stay private and confidential