At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DBIR Report, 80 percent of confirmed data breaches involved weak, default or stolen passwords; or brute force credential compromises.
The risk will vary depending on the level of access it provides and has become increasingly pronounced with the sudden and unplanned growth in remote working that exposed the limitations of legacy architectures. Modern IT allows users to work from anywhere, on any device, on any cloud app and across any network with full control and visibility into all data – no matter where it resides.