{"id":621,"date":"2023-06-15T11:01:11","date_gmt":"2023-06-15T03:01:11","guid":{"rendered":"https:\/\/www.info-trek.com\/blog\/?p=621"},"modified":"2024-05-02T12:13:02","modified_gmt":"2024-05-02T04:13:02","slug":"whats-the-easiest-gateway-to-data-breach","status":"publish","type":"post","link":"https:\/\/www.info-trek.com\/blog\/whats-the-easiest-gateway-to-data-breach\/","title":{"rendered":"What\u2019s the Easiest Gateway To Data Breach?"},"content":{"rendered":"\n<p>Nearly everyone has one or more and you cannot live without them.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.info-trek.com\/blog\/wp-content\/uploads\/2020\/01\/data-1590455_1920-1024x692.jpg\" alt=\"data breach\" class=\"wp-image-6887\" width=\"549\" height=\"370\"\/><\/figure>\n\n\n\n<p>Passwords. It\u2019s hard to believe but a report by&nbsp;<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">Verizon Data Breach Investigations Report (DBIR)<\/a>&nbsp;found that 81% of data breaches are still caused by weak, reused, and compromised passwords. A separate&nbsp;<a href=\"https:\/\/www.eurodns.com\/blog\/password-management-data-security\">investigation<\/a>&nbsp;spearheaded by WatchGuard, a network security company found that they succeeded in cracking 355,000 government and military passwords in only 2 days. Common and predictable passwords such as \u201c12345\u201d are to blame.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data Breach Case<\/h3>\n\n\n\n<p>The habitual use of weak passwords is not exclusive to government sector only. Sony Pictures had an unfortunate dalliance with cyberattacks in 2014 thanks to the North Korean government (<em>allegedly<\/em>). The perpetrator launched an aggressive all-out hack on the US entertain company when it refused the demand to withdraw&nbsp;<em>The Interview<\/em>. Chaos ensues \u2013 copies of internal e-mails between employees, unreleased films, plans for future films, personal information about employees, and others were leaked.<\/p>\n\n\n\n<p>The fiasco raised concerns on existing cybersecurity infrastructure of Sony Pictures. However, the notable outcome is probably the financial loss whereby it costs the company&nbsp;<a href=\"https:\/\/www.computerworld.com\/article\/2879480\/2014-cyberattack-to-cost-sony-35m-in-it-repairs.html\">USD$35 million<\/a>&nbsp;for IT repairs.<\/p>\n\n\n\n<p>What could likely cause this? As you have probably guessed it,&nbsp;<strong>weak passwords<\/strong>. Dump files collected from the incident revealed that the employees in Sony Pictures use passwords such as \u201cpassword\u201d and \u201cs0ny123\u201d. Human factor plays a key role to prevent data breaches and the lack of preparedness rear its ugly outcome in the case of Sony Pictures hack.<\/p>\n\n\n\n<p>Worryingly, this trend of weak passwords continue to persist. A&nbsp;<a href=\"https:\/\/securityaffairs.co\/wordpress\/55361\/digital-id\/popular-passwords-2016.html\">study<\/a>&nbsp;by Key Security found that people continue to use weak passwords and \u201c123456\u201d was the most popular password in 2016. A online security&nbsp;<a href=\"http:\/\/services.google.com\/fh\/files\/blogs\/google_security_infographic.pdf\">survey<\/a>&nbsp;by Google found that 65% of users utilize same password for multiple accounts. The re-use of same passwords is a&nbsp;<a href=\"https:\/\/www.helpnetsecurity.com\/2019\/11\/12\/password-reuse-problem\/\">ticking-time bomb<\/a>&nbsp;for users indulging in this practice.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/marketing.info-trek.com\/acton\/media\/32501\/comptia-cybersecurity-certification-info-trek\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.info-trek.com\/blog\/wp-content\/uploads\/2020\/01\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Be-the-forefront-of-IT-advancements-in-virtually-any-fields.-Flat-price-@-RM3500-3.png\" alt=\"\" class=\"wp-image-6889\"\/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">End Weak Passwords For Good<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><em>How strong is your password? This&nbsp;<\/em><a href=\"https:\/\/www.betterbuys.com\/estimating-password-cracking-times\/\"><em>interactive tool<\/em><\/a><em>&nbsp;by BetterBuys gives you a reality check.<\/em><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Weak dangers poses a danger to an organization. Financial loss is regrettable but a damaged reputation is probably the worst outcome. To prevent data breaches, good practices of passwords should be considered.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Avoid Periodic Changes<\/h4>\n\n\n\n<p>Often we are advised to change our passwords every 60 \u2013 90 days. Repeated change of passwords impose greater difficulties for cybercriminals but unfortunately, it also causes a strain on users\u2019 memory. Therefore, IT cybersecurity specialists should advise employees to change their employees only when there is a potential risk.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Create Password Blacklist<\/h4>\n\n\n\n<p>Research on a list of common passwords used by online users and use it as a blacklist to prohibit employees from using them. Hackers usually attack by gaining access by using common passwords, therefore, we need to outsmart them. Continuous review of the blacklist ensure no weak passwords are used and this will prevent any potential data breaches,<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Authorize Two-Factor Authentication<\/h4>\n\n\n\n<p>Passwords alone may not be sufficient. Two-factor authentication can reinforce access management to corporate servers. Additional codes will be delivered to users\u2019 smartphones to confirm their identities. This type of authentication helps to enhance identity verification when employees are trying to access sensitive data.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Passwords may seem trivial to some, but they are the gatekeepers for data security for each individual and organizations. Arguably it\u2019s the first line of defense against cyberattacks, one should take their passwords seriously. Prevention is better than cure, a strong passwords can prevent incidents of identity theft, data breach, and others that scream&nbsp;<em>tragedy<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nearly everyone has one or more and you cannot live without them. Passwords. It\u2019s hard to believe but a report by&nbsp;Verizon Data Breach Investigations Report (DBIR)&nbsp;found that 81% of data breaches are still caused by weak, reused, and compromised passwords. A separate&nbsp;investigation&nbsp;spearheaded by WatchGuard, a network security company found that they succeeded in cracking 355,000 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":545,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/comments?post=621"}],"version-history":[{"count":1,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/621\/revisions"}],"predecessor-version":[{"id":622,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/621\/revisions\/622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media?parent=621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/categories?post=621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/tags?post=621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}