article thumbnail

Retail and Hospitality Trending Holiday Cyber Threats

Duo's Security Blog

And in our ebook, Retail Cybersecurity: The Journey to Zero Trust , we share ways that Duo can help retailers improve their security posture. Get started by downloading our ebook, Retail Cybersecurity: The Journey to Zero Trust , today. In this post, we break down some of the threats facing retail security teams.

Retail 121
article thumbnail

News Alert: Survey shows vast majority of IT pros consider ‘passwordless’ access a top priority

The Last Watchdog

The top-five data points from the survey include: •92% of respondents are concerned about compromised credentials because of phishing or social engineering attacks, which points to the recent rise and success of both these attack vectors. •59% and Canada were surveyed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intro to Phishing: How Dangerous Is Phishing in 2023?

Duo's Security Blog

Accounting for nearly a quarter of reported incidents in Australia, phishing is a broad category of social engineering with several variations. These social engineering techniques tricked employees into revealing their login credentials, which allowed attackers to access additional systems and data. What is phishing?

Phishing 106
article thumbnail

Why Cybersecurity Strategy Must Start With Identity

Duo's Security Blog

However, attackers have become adept at finding the gaps where MFA is not required or subverting MFA altogether through technical mechanisms like adversary-in-the-middle or even just particularly nuanced social engineering.

article thumbnail

Identity-Based Breaches: Navigating the Aftermath

Duo's Security Blog

Educated employees are less likely to fall victim to social engineering attacks, reducing the risk of future breaches. If you’d like to learn more about building a playbook for breach response, check out our eBook: Building an Identity Security Program.

Passwords 111
article thumbnail

New Duo E-Book, Attack Vectors Decoded: Securing Organizations Against Identity-Based Threats

Duo's Security Blog

They can take advantage of the less secure methods of authentication, like one-time passcodes, and socially engineer a user to hand over codes or intercept them before they reach the end user. However, attackers are finding ways around MFA.

article thumbnail

Watching the Watchmen: Securing Identity Administrators

Duo's Security Blog

They famously use a variety of social engineering techniques (e.g., If you’re interested to learn more about building a robust Identity Security program to handle identity admin security and much more, check out our ebook: Building an Identity Security Program. What is the response workflow when risky admin activity is detected?