The discovery of what has been dubbed the Mother of all Data Breaches (MOAB), reportedly containing 12TB or 26 billion records representing 3,800 separate data breaches, should remind everyone to then need to maintain strong passwords and change default credentials. The hoard contained user data from some of the world's best known brands, including Twitter (now X), LinkedIn, Zynga, and Adobe, along with records of various government organizations in the US, Brazil, Germany, Philippines, and Turkey, according to CyberNews. It's not known who or what group collected the data, but it's believed to be comprised of a combination of previously and newly stolen records. Despite likely containing a great deal of older information, MOAB presents a massive threat to the general public and the breached organizations. This threat exists primarily because too many individuals not only never change their passwords but often reuse them across multiple accounts. At the same time MOAB’s revelation an excellent reminder to organizations of the importance of changing admin credentials on devices within their networks. Sure, going into an account and altering a password can be a bit time-consuming, but coming up with an effective, easy-to-remember password is simple. To make the task even easier, here are some top tips from the elite Trustwave SpiderLabs team to ensure their organization has a strong password security posture: One of the easiest paths into an organization is through an Internet of Things (IoT) or connected device that retains the admin credentials set at the factory. These credentials are often well-known and available to threat actors via the dark web. While the MOAB data dump may or may not contain such credentials, the possibility certainly exists and is a good reminder that there are other methods threat actors use to gain credentials. Let's take a quick refresher course: To protect against phishing attacks, always be cautious of emails or messages that ask you to open attachments, follow web links, or enter your login credentials. To protect yourself from social engineering attacks, you should always be cautious of requests for sensitive information, particularly if they are unsolicited. It would be best if you were also wary of any request to gain access to your computer without verifying the request through authorized channels. Organizations that lack the in-house ability to handle these tasks required to maintain security should consider partnering with a company with such expertise. A Managed Security Service (MSS) provider like Trustwave, with our Managed Detection and Response (MDR) solution, may provide the answer. Without the right expertise, organizations won't get the value out of these technologies that they desire. Likewise, a traditionally managed security service provider (MSSP) that focuses on monitoring logs and alerts is missing a large part of the picture and can generate many false positives and low-value work for their customers. Click the Consulting and Professional Services image to get started down the path to great cybersecurity.Devising Strong Passwords isn't Difficult
Length does matter. Passwords with eight characters can be cracked within a day using brute-force techniques. Opt for a minimum of 10 characters for increased security. Mix it up by incorporating symbols, numbers, and a combination of uppercase and lowercase letters to make your password more resilient against hacking attempts.
Easy to Remember, Hard to Crack: Utilize phrases that are memorable to you but challenging for others to guess. For instance, "GoodLuckGuessingThisPassword" provides both strength and memorability.
Doing so helps one stay ahead of threats. It's a solid practice to change passwords every 60 to 90 days, especially for sensitive accounts. Avoid using the same password across multiple platforms to mitigate risks.
IT administrators should use unique, random "salts" when "hashing" stored passwords. This involves combining a piece of random data with each password before calculating the hash.
An organization's password policies should consider contextual elements, such as company identifiers, products, or local references. Tailor policies to enhance security without sacrificing usability.
Identify weak links by regularly auditing staff passwords to pinpoint vulnerabilities within your organization. Threat actors often target non-tech-savvy users, making it crucial to address potential soft spots.
MFA effectively creates a double layer of defense. Supplement passwords with 2FA to add an extra layer of verification. If a password is compromised, the second factor acts as a formidable defense.Unchanged Admin Credentials are an Unlocked Door
How Trustwave Can Help
The proliferation of artificial intelligence tools worldwide has generated concern among governments, organizations, and privacy advocates over the general lack of regulations or guidelines designed...
Not every criminal illegally entering a business is looking to steal cash, equipment, or merchandise; some are looking to take something a bit more ephemeral. This scenario is particularly true for...
Ransomware poses a pervasive threat to businesses, with no foolproof method to completely ward it off. However, organizations can adopt practical measures to reduce their vulnerability and bounce...