Remove Accountability Remove eBook Remove Passwords
article thumbnail

Uncovering & Remediating Dormant Account Risk

Duo's Security Blog

Before diving into the specifics of dormant accounts, it's important to take a step back and discuss a prerequisite: gaining cross-platform visibility into identity and access management data. And finally, individual users often have multiple accounts (Gmail, Yahoo, etc.) Why are dormant accounts a risk?

article thumbnail

News Alert: Survey shows vast majority of IT pros consider ‘passwordless’ access a top priority

The Last Watchdog

59% are confident that compromised accounts or credentials have led to a successful cyber-attack over the last 12 months, which indicates the growing concern about the general security of credentials and the vulnerability of those credentials to execute cyber-attacks. •82%

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Duo vs. Fraudulent Device Registration

Duo's Security Blog

It is a well-known and established point that a password alone is not enough to secure an account. This type of attack is known as Account Manipulation: Device Registration. You can also check out this Duo help article that provides policy recommendations and directions for how to secure your accounts.

article thumbnail

Retail and Hospitality Trending Holiday Cyber Threats

Duo's Security Blog

And in our ebook, Retail Cybersecurity: The Journey to Zero Trust , we share ways that Duo can help retailers improve their security posture. Single sign-on (SSO) fortifies MFA by creating fewer passwords and a single dashboard for users to log into to reach all of their applications in one place.

Retail 121
article thumbnail

Turning Microsoft’s MFA Requirement for Azure Into an Epic Security Win With Duo

Duo's Security Blog

of account compromise attacks.” of account compromise attacks.” We have evolved from passwords to multi-factor authentication (MFA) to phishing-resistant passwordless — our most secure form of authentication to date. As Microsoft points out in their announcement, MFA “can block more than 99.2% MFA “can block more than 99.2%

article thumbnail

U.S. Bookstore giant Barnes & Noble hit by cyberattack

Security Affairs

The bookseller also operated the Nook Digital, which is a spin-off division that sells eBook and e-Reader platform. Over the weekend, users have been complaining on Nook’s Facebook page and Twitter that they were not able to access their library of purchased eBooks and magazine subscriptions. ” states GoodReader.

article thumbnail

Identity-Based Breaches: Navigating the Aftermath

Duo's Security Blog

Here are some best practices to put in place after an identity breach occurs: Short-term best practices Identify and Remediate Affected Accounts: Conduct a thorough investigation to identify all compromised accounts. Reset and Secure Accounts: Force a password reset for all affected accounts and consider strengthening MFA requirements.

Passwords 111