eMazzanti Shares Common Password Mistakes and How Hackers Exploit Them

Share Article

NYC area IT security consultant discusses common cyber security missteps and why hackers love weak passwords—in a new article from eMazzanti Technologies

weak passwords
Limited resources and lack of expertise often leave security gaps in smaller organizations compounded by weak passwords and other risky practices.

A NYC area IT security consultant and managed services provider (MSP) discusses how weak passwords play a significant role in cyber-crime in a new article on the eMazzanti Technologies website.

The informative article first presents common password mistakes in business settings. The author then reviews five ways in which hackers exploit them, including credential stuffing, social engineering and password spraying. He then encourages the use of multi-factor authentication and password managers to strengthen cyber defense.

“Limited resources and lack of expertise often leave security gaps in smaller organizations compounded by weak passwords and other risky practices.,” stated Almi Dumi, CISO, eMazzanti Technologies.

Below are a few excerpts from the article, “Close the Door to Hackers by Purging Weak Passwords.”

Common Password Mistakes

“Do multiple techs share passwords for privileged accounts or keep a list of passwords stored in a spreadsheet? Perhaps you or other employees re-use passwords to avoid trying to remember dozens of different credentials. These password practices may save some time in the short term, but they leave your business vulnerable to attack.”

Hackers Love Weak Passwords

“According to the most recent Verizon Data Breach Investigations Report (DBIR), compromised credentials play a factor in 80 percent of hacking-related data breaches. Cyber criminals exploit weak passwords in several different ways. Some of the most common include:”

1)    “Credential stuffing – Hackers purchase lists of credentials stolen from sites with poor security. They then test these credentials against other websites. Statistically, they have a good chance of finding that users have re-used passwords on multiple sites.”

2)    “Social engineering – Phishing plays a factor in the majority of cyber-crimes. Criminals pose as legitimate businesses or other trusted source, tricking their victims to reveal credentials.”

More ways hackers exploit weak passwords >>

Protect Your Business by Purging Weak Passwords

Businesses that take steps to ensure against weak passwords significantly strengthen their defense against cyber-attack. eMazzanti Technologies urges the use of multi-factor authentication and password managers. In addition, password policies should emphasize and enforce good password hygiene, particularly for privileged accounts.

The data security experts at eMazzanti have helped hundreds of small and mid-size businesses implement comprehensive cyber security. They keep up to date on the latest developments in security technology to expertly craft a solution built for the needs of each business.

Have you read?

Law Firm Mobile Security Best Practices

Stop Abbreviating 2020 and Essential Tech Tips for the New Year

About eMazzanti Technologies

eMazzanti’s team of trained, certified IT experts rapidly deliver increased revenue growth, data security and productivity for clients ranging from law firms to high-end global retailers, providing advanced retail and payment technology, cloud and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring and support.

eMazzanti has made the Inc. 5000 list eight consecutive years, is a 4X Microsoft Partner of the Year, the #1 ranked NYC area MSP and NJ Business of the Year! Contact: 1-866-362-9926, info@emazzanti.net or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kent Sorensen
Visit website