LATEST INTELLIGENCE
breach might include passwords for one service that employees have re-used on corporate accounts . Even a breach that doesn ’ t include raw credentials might include the personal information ( street address , high school , mother ’ s maiden name ) that make it possible for attackers to gain temporary access by requesting a password change .
The Equifax breach probably contains more personal information than the average person even knows about themself . Although anti-phishing security is important , it is only one part of the equation when it comes to defending against Account Takeover . p
This correlates with the data that HEC researchers see . In March alone , we saw 1,345 unique compromised accounts . Of those , 783 began sending out phishing or spam messages . That ’ s a 179 % increase from the previous month .
So what to do ? In this whitepaper , we ’ ll discuss how to prevent account takeover from taking control of your business .
Monitoring Account Takeover
Although phishing messages are the most common way for hackers to gain access to an account , they are far from the only method . Large , third-party data leaks like Yahoo and LinkedIn have created a market for hackers to exchange stolen passwords . Even Post-It Notes are not safe from online distribution . A
Download whitepapers free from www . intelligentcio . com / me / whitepapers /
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 21