As highlighted in our previous blog regarding How Multi-factor Authentication (MFA) Can be Breached, MFA simply isn’t enough of a security measure to then forget about the importance of password security and weak, default or breached passwords.
Weak, default or breached passwords are one of the biggest threats to a user and/or business. Account compromises usually start with the threat actor discovering a user’s credentials from dictionary attacks to password spraying. Once the threat actor has obtained a password, they will then move their focus on compromising MFA. Once they overcome these lines of defence, they will then conduct lateral movements across a trusted environment to access valuable assets such as sensitive data, and may proceed to harvest, encrypt, and/or delete that data.
A weak password dramatically increases the chances of the threat actor ultimately breaching accounts. Strong passwords offer no protection if that password has already been compromised. There are several legitimate websites which you can search to see if your password has been compromised and leaked online. However, the simple rule of thumb is to avoid using weak or default passwords for accessing multiple systems and to enforce a strong password policy and ensure regular password changes.
MFA is then the additional layer of security it’s intended to be.
Author
Richard Huggins
Richard joined us in 1997 as an apprentice IT engineer conducting on-site installations of CAD workstations and Microsoft and Novell network environments. After a brief spell away to travel the world, he returned to work on our helpdesk supporting our CAD customers. In 2007, Richard was promoted to Support Services Manager and worked in this role until 2016 when he decided to acquire new skills and widen his IT industry knowledge and left to work as an Operational Manager for one of the UK’s Top 20 leading Information Security companies. In 2019 Richard once again returned to Symetri as Head of Support and Customer Success to further improve the Symetri customer support experience and is now responsible for the IT Solutions division.