Lessons from the Fortune 1000: Exploring Third-Party Account Takeover Risk and What to Do About It
123456, password, password1: These are a few of the top passwords used by Fortune 1000 employees whose passwords and personally identifiable information have been exposed in third-party breaches. While the dangers of easy-to-guess passwords are well-known, even employees at top companies are guilty of bad password hygiene. Criminals actively use weak and stolen credentials for malicious purposes, such as committing account takeover fraud and business email compromise (BEC). If an employee at one of your partners or vendors is compromised, attackers are just one step away from breaching your own enterprise.
Using the largest repository of breached credentials in the world, SpyCloud has analyzed breach data tied to Fortune 1000 employees to understand what information is out there and how it can be used to commit fraud. In this webinar, SpyCloud Head of Product Strategy Chip Witt will walk through SpyCloud's analysis of exposure in the Fortune 1000 and what it means for your enterprise.
Register to learn:
- The scope of exposure across different industries in the Fortune 1000, including employee credentials, PII, and password reuse rates
- How criminals are using that data in account takeover attacks against organizations and their affiliates
- What you can do to protect your enterprise from third-party exposures