Here at Authlogics, we’re extremely privileged to have access to a cache of password-related data. The Password Breach Database is a treasure trove for security analysis, allowing us to use the 1 billion unique clear text passwords to develop trends and patterns found in data breaches that have exposed passwords. Using this, we can make..
It is well known that longer passwords are more secure than short ones, however, when it comes to IT security users will usually do the bare minimum. If a password policy only requires an 8 character password, most users will only use 8 characters and no more. This behaviour is partly down to laziness, but..
You’re back in the stadium watching your favourite football team play, the crowds are going wild and your team is winning. Look again at the number of people present (when stadiums are back to full capacity) and imagine each one of those fans had the same password – football. Football fans around the world are..
The future of passwords is under the spotlight at present. The discussion to remove and replace them with alternative authentication methods is being addressed in many virtual boardrooms around the world with the need to migrate towards passwordless authentication. As password-related breaches become more common (SolarWinds and Cit0Day) and bigger (COMB), it is becoming more..
No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
Data breaches are regularly in the news. As hackers become more efficient and security policies begin to fail, it is becoming more glaringly obvious that most businesses are ill-equipped to fend off hackers and guarantee security against a corporate data breach. The fear now is not “will our company be hacked?” but “when will our..