The Right Level of Authentication:
Stolen Credentials Are the Most Common Weapon Used in a Breach
Outsiders gain access to insider credentials through various means, phishing is the most popular method. It requires relatively little investment and is highly effective. Other credential-related vulnerabilities include weak passwords and credentials shared across multiple systems. Weak passwords are a challenge. Managing against them requires a balance of establishing the ultimate password and allowing users to choose something that they can actually remember, especially for environments where no single sign-on is used.
- Whether you’re big or small, your risk is big
- Add more Security than Just what the users know
- Authentication needs More Intelligence
- Using Convenience to increase Security
Find out more by downloading the paper