Research Reveals Half of Government and Military Employees Have Weak LinkedIn Password
Hikvision Offers Cybersecurity Resources, Tips for Partners
WatchGuard research revealed that half of LinkedIn passwords for government and military employees, mostly from the U.S., were able to be cracked in less than two days, according to an article in Security magazine.
“Authentication is the cornerstone of security and we’re seeing overwhelming evidence of its critical importance in the common trend of password- and credential-focused threats throughout Q2 2018. Whether it’s an evasive credential stealing malware variant or a brute force login attack, cyber criminals are laser-focused on hacking passwords for easy access to restricted networks and sensitive data,” said Corey Nachreiner, chief technology officer at WatchGuard Technologies, in the article.
WatchGuard research also uncovered the following information:
-
Mimikatz was the most common malware in Q2: Mimikatz is a well-known password and credential stealer. Its increasing popularity indicates “that passwords alone are inadequate as a security control and should be fortified with MFA services that make hackers’ lives harder by requiring additional authentication factors,” per the article.
-
Cyber criminals continue to exploit vulnerabilities in Microsoft Office, with three new Office malware exploits making WatchGuard’s top 10 list.
-
Seventy-six percent of Q2 threats were web-based.
To read the full article on the Security magazine website, click here.
Hikvision offers numerous cybersecurity resources, including its online Cybersecurity Center and its dedicated cybersecurity hotline. It also provides tips and best practices for partners online with its HikWire blog. Hikvision’s cybersecurity director recently presented six steps to reduce the threat of password hack, which included changing default passwords, using a password management tool, and creating a long, strong password. You can read the entire article here.
For more cybersecurity tips from Hikvision, visit us online here.