Express Computer
Home  »  Guest Blogs  »  5 Key Threats to Password Security, and How to Safeguard Against Them

5 Key Threats to Password Security, and How to Safeguard Against Them

0 226

By Sophos

Today is World Password Day.

Every year, on the first Thursday of May, World Password Day is celebrated to raise awareness about the importance of password security, password-related cybersecurity threats, and the best practices users and organizations can employ to safeguard their passwords, and thus their systems.

Let us examine some of the most significant threats to password security:

Phishing
Phishing involves a hacker contacting a victim while posing as a legitimate representative of a trusted entity (such as a bank, government agency, educational institute etc.) to trick them into revealing their passwords and other sensitive information.

While many users are alert and aware of the dangers of phishing scams, they continue to evolve in their sophistication – from spear phishing (hackers targeting specific individuals while impersonating a close contact) to URL hijacking (creating false websites with nearly-identical domain names to trick visitors into entering their credentials) and more.

Brute Force Attacks
Brute force attacks involve hackers systematically trying out different password combinations until they are able to successfully gain access to an account or system.

Simple passwords (such as ‘12345’, birthdays or other personal details about the user etc.) are particularly vulnerable to such attacks.

The methodology has evolved over time with Hybrid brute force attacks leveraging automated tools (including AI-powered tools) that can try thousands of password permutations in seconds.

Credential stuffing is a related form of cyber-attack wherein hackers use passwords stolen in one successful data breach to attempt to access different accounts of the same users. Reusing the same passwords (or variations) across multiple accounts makes users highly vulnerable to this.

Man-in-the-Middle Attacks
Man-in-the-Middle attacks are caused by poorly secured communication channels, wherein cyber-attackers intercept authentication messages between servers and clients.

The hacker monitors users logging into an insecure website. This login data is relayed to the hacker, who then redirects the user to a false website. Users navigate through this false website, believing they are securely accessing their personal data, while unwittingly feeding malicious actors their passwords and other sensitive details.

Keylogging
A more sophisticated method of password theft, keylogging involves hackers installing surveillance software onto user’s devices (through malware, or through a USB drive or keyboard attachment directly connected to the device) to record every keystroke the user makes. This enables the hacker to derive the users’ passwords and other confidential information.

Password Spraying
Account lockouts are an important tool in the fight to ensure password security. Password spraying has emerged as a method developed by hackers to counteract this safeguard.
Most account lockouts are triggered by making too many log in attempts during a short span of time. Hackers exploit this by trying the same password across multiple websites, before trying the next possible password. By the time the hacker has exhausted all the websites on their list and circle back to the first website with a new password, the lockout policy has reset and the previous failed attempt is not counted. In this manner, hackers can make a much greater number of attempts to crack passwords and gain access to accounts.

How to enhance password security?
Human users are unfortunately a significant weak link in the chain of password security! At an organizational level, there is a need to rigorously enforce policies around password generation, management and use. Users should using short & simple word and character combinations, or personal details, as passwords. More complex passwords, including auto-generated passwords, will provide a much stronger defense against brute force attacks.

Users should also maintain constant vigilance with regards to possible phishing scams and verify the legitimacy of any individual with whom they communicate and/or any website or app that they visit, before sharing or entering any confidential information.

Multi-factor authentication (MFA) provides an additional layer of security to accounts, frustrating hacker’s attempts to gain unauthorized access even if passwords are compromised. The use of password managers, to generate and securely store complex passwords in an organized and encrypted manner, further elevates password security in addition to offering users a more frictionless experience.

The ramifications of poor password security can be severe for individuals and organizations – from account takeovers by malicious actors, to the compromise of sensitive data. Thus, it is critical to take effective measures to enhance password security.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image