Evolve IP’s Post

View organization page for Evolve IP, graphic

10,363 followers

Did you know that hackers can go to an online marketplace and buy all manner of compromised user accounts? Just browse through what's available, pick out the ones they want, and check out. They can even pay more to get ones that are the freshest (most recently stolen). Now, you might be thinking, "Sure... but those are probably old usernames and passwords which have been changed over time," and you're right, but hackers are more sophisticated and capable nowadays, so what they do with this information is they spread out an attack to use a vast number of compromised devices as proxies. They use these devices to try every combination of those usernames and passwords, not only for the specific website, app, or service they were stolen from, but for everything. This is called a 'credential stuffing' attack, and they are happening with an alarming level of regularity these days. So, how do we protect ourselves from things like credential stuffing attacks? Well, one of the easiest ways is to enable Multi Factor Authentication - in that case, even compromised credentials cannot, compromise your entire account. For businesses, the more you can do to consolidate, modernize, and simplify the way your users work and interact with your data and applications, the more securable you can make your environment, and the easier it becomes to protect your users and help them to protect themselves. Learn more about the way you can protect yourself from online threats here: https://lnkd.in/ebEBkn2u #security #MFA #dataprotection 

To view or add a comment, sign in

Explore topics