Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

10 Ways Hackers Will Get The Best Of You

An analysis of data breaches and security incidents provides insight into the top ways hackers can get the best of you and your business. Here are 10 of the most common threat actions pulled from the 2014 Verizon Data Breach Investigations Report.

Back 1   2   3   ... 11 Next

photo

10. Stolen Credentials

Using stolen credentials to impersonate a valid user was the most significant threat action used in 2013, according to Verizon. Stolen credentials are used by financially motivated cybercriminals, hacktivists and clandestine operations, Verizon said. An attacker can use stolen credentials to appear to be a valid user on a corporate network. It's prompted security experts to call for the increased use of two-factor authentication and other measures to validate a user attempting to log into systems. Behavioral analysis systems also can be put in place to trigger an alert if it observes suspicious activity, such as a user attempting to log in at an unusual time.

 
 
Back 1   2   3   ... 11 Next

sponsored resources