New cybersecurity threats are continuously emerging in light of our increasingly connected world, AI, 5G, and other enterprise trends. In this ever-changing landscape, there is one constant: passwords remain the primary authentication method for accessing corporate systems and applications—and employees are notorious for utilizing “pwned” passwords. (In cyber security, “pwned” is jargon that often means that your account has been taken over. A pwnedpassword means your password has been exposed and is ripe for takeover.)
Pwned passwords, or passwords that have been previously exposed in data breaches, represent a significant security vulnerability. These are real-world passwords that have already been compromised, making them unsuitable for ongoing use. The exposure of such passwords means they are at a much greater risk of being used by cybercriminals to take over other accounts.
Cybercriminals can easily access these compromised credentials via the Dark Web and utilize this information to infiltrate corporate accounts. This problem is compounded by password reuse, another prevalent example of poor employee security hygiene. When employees reuse passwords across multiple accounts, they inadvertently increase the risk of a widespread security breach if even one account is compromised.
To protect against such vulnerabilities, it is crucial for organizations to implement robust password management strategies. This includes encouraging the use of strong, unique passwords and adopting multi-factor authentication to add an extra layer of security.
91% of respondents in a recent survey acknowledge that reusing passwords across multiple work and personal related accounts introduces significant security vulnerabilities. Yet 59% admit to doing it anyway. They are ambivalent about the risk of pwned passwords.
Password reuse is not only common but also perilous. It’s often chosen for convenience, yet many users remain unaware of the severe potential impacts. This practice opens the door to attacks such as credential stuffing, where cybercriminals exploit reused credentials by automating login attempts. They use known email and password pairs to breach systems, taking advantage of the ease with which they can infiltrate accounts.
Incorporating these risky behaviors into everyday digital habits increases the susceptibility of both personal and professional data to breaches. Understanding and addressing these vulnerabilities is crucial in fortifying security protocols across all platforms.
The 2012 Dropbox breach, in which hackers obtained encrypted passwords for more than 68 million accounts, is an example of how devastating the effects of password reuse can be. As Dropbox put it in a blog post, “A stolen password was also used to access an employee Dropbox account containing a project document with user email addresses.”
The long-awaited Disney+ launch also exposed the risks with password reuse. An investigation found that less than 48 hours after launch, thousands of exposed Disney+ passwords and accounts were already for sale. Bad actors were able to access Disney+ accounts because so many of its users recycled passwords from their accounts on other sites, on their Disney+ account.
With new breach data coming to light on a daily basis, guarding against the use of pwned passwords requires constant vigilance.
As Enzoic stated in a Channel Futures article, “We recently spoke with a company that discovered that 4% of its uncompromised credentials become compromised within one month and this happened month over month.”
The latter is the most crucial step companies can take in the fight against pwned passwords, as it essentially circumvents poor employee security practices.
To quote Enzoic’s Channel Futures article again, “It’s unrealistic for companies to expect password reuse to change on its own, but it’s also untenable for them to continue to allow the use of exposed credentials.”
By continuously screening all corporate passwords against our proprietary database of exposed credentials, Enzoic helps companies ensure pwned passwords remain where they belong—on Dark Web lists but never in use for enterprise systems and applications.
Explore free for up to 20 users. Save hours of admin time and simply get started with a password monitoring solution.