DEFENSESTORM BLOG
Monday, December 16th, 2024
Take a minute and think about the password(s) you use in both your professional and personal capacities. When passwords are reused or weak, they are far more susceptible to being stolen. One stolen password can lead to a detrimental data breach for your organization.
Take a minute and think about the password(s) you use in both your professional and personal capacities. Do you use the same password for everything? Do you use short, simple passwords that are easy to remember? When it is time to change your password, do you only change a number or a letter in the password? Of the many ways a bad threat actor attempts to gain access to your network, password attacks are still a prevalent method a cybercriminal uses. When passwords are reused or weak, they are far more susceptible to being stolen. One stolen password can lead to a detrimental data breach for your organization.
Cybercriminals and the threat landscape are constantly evolving and changing; this means that we must constantly evolve and change. One of those changes involves password security. The National Institute of Standards and Technology (NIST) has recently updated the cybersecurity framework from Version 1.1 (released in 2018) to version 2.0 (released in 2024). This update included more effective password practice protections. Outlined below are six (6) takeaways from that update.
Takeaways
DefenseStorm Recommendations
As always, DefenseStorm recommends the following practices to help secure your environment: