Lessons Learned: The Cautionary Tales Of Enterprise Cyber-Attacks

0
358

Reflecting on the past 12 months of enterprise cyber security incidents, there was no single attack vector and no one-size-fits-all security solution. We compiled the most common attacks faced by organizations as well as the tips, tricks and strategies for thwarting a data beach.

Strengthening Security Against Credential Stuffing Attacks

Millions of user logins are available for purchase on the dark web. Not only do these collections represent recent data breaches, they contain logins from older sites that many users are no longer visiting but continue to have an active account. Credential stuffing is a serious and growing problem for high-volume traffic sites including banking and e-commerce.

According to advice from Trend Micro, here are some ways to strengthen security against credential stuffing attacks:

  • Practice good password hygiene. Avoid reusing the same email and password combination for multiple online accounts, and change your access credentials frequently.
  • Enable two-factor authentication (2FA) whenever possible. Layered protection is always better than single access authentication.
  • Observe your network traffic and system. A…

Read More…