Weak passwords are the biggest threat to organisational cybersecurity - Express Computer (2024)

By Sairaman Srinivasan, Chief Strategy Officer, Consortium for Technical Education (CTE)

One of the significant security issues organisations globally face in the cybersecurity landscape is weak and default passwords. These issues can affect organisations of all sizes and types, from small businesses to large corporations, non-profit organisations, and government agencies. According to various studies and reports, weak and default passwords are among the top causes of data breaches and cyber-attacks. The Verizon 2021 Data Breach Investigations Report found that 61% of breaches involved credential data.

Default and weak passwords are a significant threat to organisational cybersecurity. Device manufacturers and software vendors use default passwords that are often easy to guess, making it easy for hackers to access systems and devices. On the other hand, weak passwords are easily guessable because they are too short, simple, or widely used. Hackers can use various techniques to decrypt weak passwords, including brute force attacks, dictionary attacks, and phishing.

Addressing concerns around default and weak passwords

The primary risk associated with default passwords is their widespread availability and ease of access for potential attackers, making the devices highly vulnerable. These passwords are provided by device manufacturers and service providers as temporary access credentials during device installation or configuration.

When users or system administrators fail to change or reset the default passwords, their systems are vulnerable to attacks. Attackers can easily locate these default passwords on the vendor’s website or through trial and error, as they are often simple and commonly used words or numbers.
Unfortunately, many organisations have a widespread problem with using default or weak password practices. Passwords such as “123456”, “qwerty”, “admin”, “admin@123”, and “password” consistently remain among the most commonly used passwords. If these passwords are reused across multiple accounts, it becomes even easier for attackers to gain access to sensitive corporate information.

Furthermore, when devices and services with default passwords are connected to the internet, malicious actors can use simple techniques like credential stuffing and password spraying to exploit these vulnerabilities, gaining unauthorised access to devices. This can lead to significant consequences, including data breaches, access to sensitive information, financial loss, or even identity theft. Therefore, changing default passwords immediately after device installation or configuration is highly recommended and crucial. Selecting strong and distinct passwords to safeguard devices and accounts within the network is considered the best practice.

Implementing safeguarding measures

To start with, it’s crucial to take steps that can prevent a security breach resulting from vulnerable or default passwords. Therefore, organisations must develop a comprehensive incident response strategy, like encouraging users to use stronger passwords, enforcing a password policy that specifies the requirements for passwords, such as length and complexity, creating a password deny list to prevent users from choosing common, weak passwords, organising security awareness and training programs to educate users about the importance of changing passwords after a security incident and why it requires to deny access to users who have made a certain number of unsuccessful/failed login attempts.

To incorporate an additional layer of security, it’s critical that databases containing sensitive information are properly configured and that the residing data is encrypted. It is recommended that users regularly rotate their login credentials and implement multi-factor authentication (MFA) to ensure that an attacker cannot access user credentials, even if they have access to the account.

Implementing Two-Factor Authentication (2FA) aims to increase the security level beyond just using passwords alone, as passwords can be compromised. 2FA is a security mechanism where users are provided with two different forms of authentication to access their accounts. In the context of password security, 2FA entails using a second-factor authentication, such as a mobile device (to receive the OTP), in addition to the password, to verify the user’s identity.

Although 2FA is an effective security measure, it is partially infallible, and users should still take precautions to ensure that their passwords are robust, well-protected, and changed regularly.

To conclude

The most significant danger to an organisation’s cybersecurity is weak and compromised passwords, which not only make it easier for brute-force attacks to occur but also, having weak passwords increase the risk of ransomware attacks. Therefore, using strong, unique, uncompromised passwords is crucial because implementing advanced security measures alone is not enough to safeguard organisational networks and systems.

Weak passwords are the biggest threat to organisational cybersecurity - Express Computer (2024)
Top Articles
Incoterms®
When should you buy new running shoes for your event?
Dannys U Pull - Self-Service Automotive Recycling
Moon Stone Pokemon Heart Gold
Cottonwood Vet Ottawa Ks
Tesla Supercharger La Crosse Photos
Evil Dead Rise Showtimes Near Massena Movieplex
CKS is only available in the UK | NICE
Craigslist - Pets for Sale or Adoption in Zeeland, MI
Music Archives | Hotel Grand Bach - Hotel GrandBach
Fcs Teamehub
Xm Tennis Channel
Persona 4 Golden Taotie Fusion Calculator
David Turner Evangelist Net Worth
Summoner Class Calamity Guide
Pekin Soccer Tournament
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Band Of Loyalty 5E
Daylight Matt And Kim Lyrics
Costco Great Oaks Gas Price
Decosmo Industrial Auctions
Busted Campbell County
SuperPay.Me Review 2023 | Legitimate and user-friendly
Sussyclassroom
Gazette Obituary Colorado Springs
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
Prot Pally Wrath Pre Patch
Wiseloan Login
Kirk Franklin Mother Debra Jones Age
8002905511
Craftybase Coupon
Kqelwaob
Craigslist Sf Garage Sales
M3Gan Showtimes Near Cinemark North Hills And Xd
The Mad Merchant Wow
About Us | SEIL
Ket2 Schedule
Case Funeral Home Obituaries
Stanford Medicine scientists pinpoint COVID-19 virus’s entry and exit ports inside our noses
Cherry Spa Madison
Daily Times-Advocate from Escondido, California
Gvod 6014
Gym Assistant Manager Salary
Centimeters to Feet conversion: cm to ft calculator
Reilly Auto Parts Store Hours
Anonib New
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Aaca Not Mine
Bumgarner Funeral Home Troy Nc Obituaries
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5684

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.