Businesses are facing a surge in attacks using stolen identity credentials — now the largest source of breaches. While there’s no cure-all, experts recommend a strategy involving the adoption of stronger authentication and authorization systems, as well as tools to provide better visibility into identity-based attacks and “shadow IT” use.
Adoption of stronger identity authentication, up-to-date awareness training, and a data-driven approach to combating cyberthreats are among the top investments that businesses can make for their cybersecurity programs.
The Microsoft security executive told Protocol that she’s driven by the potential to help people feel safe in their digital lives.
In Protocol’s data analysis of the changing cyberthreat landscape, attacks using stolen credentials are on the rise, while phishing risks are down.