Skip to content

Password Reuse: Understand the Risks of this Practice

Password reuse is one of the main reasons why passwords have been questioned as an effective measure to guarantee protection against intrusion into accounts and systems. 

This practice is extremely risky as it allows a malicious agent to have access to numerous accounts with a single string of characters, being able to steal confidential and valuable data, in addition to extorting a common user.

This type of problem can be especially devastating for organizations, which deal with a variety of information every day and can respond to legal proceedings if they do not comply with legislation such as the LGPD, which determines how the personal data of their customers, employees, and suppliers should be handled.

 

Check out some alarming statistics on password reuse:

  • According to a survey carried out by Google, at least 65% of people have the habit of using the same password for different services;
  • According to information provided by Microsoft, 44 million is the number of accounts vulnerable to hacking due to theft and compromise of passwords;
  • 76% of millennials put their accounts at risk through password reuse, according to Security.org;
  • The Verizon Data Breach Investigations Report points out that password reuse is the reason behind 81% of hacking attacks.

In this article, we show you what you need to know about password reuse. Our content covers the following topics:

  • Why is the Habit of Reusing Passwords so Common?
  • Password Reuse: What is the Problem with this Practice?
  • What Are the Most Common Types of Password-Related Attacks?
  • Three Tips for Having Strong Passwords and Managing Them Securely
  • Multifactor Authentication and Two-Step Verification: How Important Are They?

Read it until the end!

Why is the Habit of Reusing Passwords so Common?

People daily connect to different websites, services, and social media that require passwords to access them. The main problem is that it is difficult to memorize dozens of passwords, especially complex ones, which are the most suitable for guaranteeing the cybersecurity of people and organizations.

Thus, it is common for people to use the same password on all their accounts, or to make small changes to differentiate the codes to be used.

But don’t worry: in the next topics, we will bring solutions to this problem, such as password managers and multifactor authentication. 

Password Reuse: What is the Problem with this Practice?

Password reuse is a risky practice for many reasons. Here are some problems caused by this habit: 

  • Multiple Accounts Can Be Compromised

Reusing passwords makes it possible for a malicious agent to hack into an account to have access to others belonging to the same user. And the more a password is reused, the greater the risk of having the credentials breached.

In 2021, Facebook suffered a hack, which affected about 20% of its accounts, leaking data from 533 million people. This means that if your bank password is the same used on this social network, for example, it will also become vulnerable.

  • It Puts Corporate Accounts at Risk

When an employee has no real sense of how much a cyber-invasion can harm the company they work for and how password reuse is associated with it, the organization is at serious risk.

This is because in addition to stealing personal data from this professional, malicious agents are able to gain access to the company’s accounts, causing great inconvenience, losses, and compromising business continuity.

For this reason, we always recommend that organizations promote cyber awareness among their employees and train them to deal with threats. One of the mandatory subjects in these pieces of training is precisely the risks involved in password reuse

Accounts become more vulnerable to brute force attacks and password cracking, and the more credentials a malicious actor has access to, the greater their power when it comes to brute force techniques.

And with more and more people trying to protect their accounts with weak and repeated passwords, it has become easier for hackers to gain access through brute force.

Also, with each intrusion, they expand their database, as they increasingly identify complex passwords they can use in future attacks.

The Consequences of Phishing Attacks Are More Severe

Phishing attacks are a means used by hackers to gain access to people’s data. Generally, it works like this: attackers send an alert pretending to be a trusted institution, and asking for important information, such as credit card details, full name, date of birth, and passwords. 

This message can come in several ways, including an email in which the user is instructed to access a fake website and enter the requested information. 

The victim can be instructed to update their data with the explanation that the account would have been accessed through a suspicious login, and follow the guidelines because trusts the institution associated with the message received. 

Therefore, it is possible to say that password reuse can aggravate the consequences of phishing attacks, since the user will have more accounts exposed. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

CyberLink’s FaceMe® Achieves Perfect Score in iBeta’s Advanced Level 2 Anti-Spoofing Test and Complies with ISO 30107-3

TAIPEI, TAIWAN — March 16, 2022 — CyberLink Corp. (5203.TW), a pioneer in multimedia and AI technologies, announced today Dr. Jau Haung, its founder and CEO, has been invited to speak at NVIDIA’s GPU Technology Conference 2022 (GTC). Dr. Huang will address the role of AI in helping content creators enhance productivity and improve quality when making engaging, professional videos. The presentation will take place virtually on Thursday, March 24 at 11 a.m. CST (Wednesday, March 23 at 11 p.m. ET/8 p.m. PT).

GTC is a global AI conference held every half year, bringing together hundreds of developers who share the latest trends and applications for AI, computer graphics, data science, and machine learning.

At GTC 2022, Dr. Huang will share how CyberLink utilizes AI-powered tools in PowerDirector, its flagship video editing software, for features such as AI style transfer, sky replacement, motion tracking, and a series of enhancer tools. CyberLink first introduced its video editing software in 2001 and closely followed rising trends for more than two decades – from SD and HD to VR and 4K, from optical discs and files to online and streaming media – before deploying AI for editing in 2020.

“Artificial intelligence changes every aspect of life, from industrial-level image recognition to video analytics, security, autonomous vehicles and digital content creation,” said Dr. Jau Huang, CEO of CyberLink. “As the world-leading AI and multimedia software developer, we use AI extensively in our FaceMe® facial recognition solution as well as our creative software and apps, such as PowerDirector. It is CyberLink’s mission to help video creators at all levels achieve image and audio superiority, allowing them to create something extraordinary no matter their skill level.”

In the past, the use of motion tracking or motion masks was a labor-intensive and time-consuming undertaking reserved to professional creators. With the help of AI technology, PowerDirector delivers fast, accurate motion tracking – with just a few clicks, making this powerful tool accessible to every creator and for all creations, ultimately raising standards across all video productions.

In the same vein, AI brings some of the most sophisticated special effects to novice creators while cutting down dramatically the time spent by industry professionals. For example, PowerDirector’s sky replacement feature uses AI to precisely segment the sky in a video sequence and replace it with footage of sky conditions that better match the desired effect or visual aesthetics. This feature has the power to transform the atmosphere of a scene in a few clicks. From a practical aspect, it enables outdoor filming in a much wider range of sky conditions, eliminating costly interruption from changing weather or simply waiting for the right time between sunrise and sunset.

To learn more about PowerDirector, visit CyberLink online at http://www.cyberlink.com, or sign-up for CyberLink’s track at GTC 2022.

CyberLink @ GTC 2022 Information

  • Topic: AI-powered Video Editing for Creators at All Levels [S41616]
  • Speaker: Dr. Jau Huang, Founder and CEO of CyberLink
  • Time:
    • Thursday, March 24 11:00AM – 11:25AM (CST, Taiwan)
    • Wednesday, March 23 11:00PM – 11:25PM (EDT, New York)
    • Wednesday, March 23 8:00PM – 8:25PM (PDT, Los Angeles)
  • GTC 2022 Official Website: https://www.nvidia.com/gtc
  • Sing up for CyberLink Track

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Three Essential Steps for Mac Patching

When it comes to the productivity of employees, few things are as valuable as each user selecting the tools that work best for them. For IT, this means creating an environment that helps employees select their preferred OS platform. When given the opportunity, many users will choose the Mac operating system. 

In order to accurately integrate Mac into the enterprise network, IT professionals need the knowledge to ensure smooth implementation, ongoing support and an effective Mac patching process. Mac is not always difficult to manage, but the procedures for securing, patching and updating are not the same with other operating systems. 

Consequently, IT administrators do not always have a concrete knowledge of how to apply the same patch deployment processes to Mac. Therefore, to help make your Mac deployment as easy as possible, we are sharing three essential steps for Mac patching.

1. Understanding How Apple Provisioning Works 

While provisioning a Mac is not really complex, the process is different from the traditional imaging method. More importantly, Apple provisioning is done through the Device Enrollment Program, which runs in the cloud and can be accessed through the Apple Business Manager Application. 

After registering device serial numbers in the device enrollment program (DEP), IT will register the devices in a mobile device management (MDM) tool. The tool helps IT to set up group policy objects (GPO). This includes settings for the configuration of users based on their designated user group. 

Additionally, it shows the applications that users should see on their desktop and their security access settings. Most times, this procedure looks strange to IT administrators who have only worked in Windows environments. 

The most essential Mac patching process is that the MDM installs the settings and applications to the devices through the Apple cloud. Therefore, end users can start working without IT professionals ever having to physically touch their Mac during the provisioning process. 

2. Deliver Updates to Mac Efficiently

The procedure for applying OS updates and security patches for Mac is simplified with a free service from Apple which is called MacOS updates. For Mac, it’s ideal to test different configurations to ensure patches and updates won’t break any applications and operating systems in the environment. 

The specific services to test include the ability to log into email, utilize VPN services and access files in shared drives. It’s important to test when deploying antivirus software because it can break the operating system and cause machines to crash. 

In order to manage the process, the best tool to use is a dedicated Apple Software Update Server. However, an alternative way is to manage and test patches on Windows and Linux machines. Open-source tools such as Munki and Reposado that run on MDM platforms can act like Mac’s software update tool, which helps IT push updates to end-users the same way they would from the update server. 

3. Secure Mac with Authentication Measures

The major way to ensure Mac security is two-factor authentication. In addition to using usernames and passwords, IT professionals can request a unique code that is sent via a text message which they need to enter before getting access to the system. Alternatively, IT administrators can give users a thumb drive to plug into their devices. Without the unique code or thumb drive, users won’t be able to log in to their system.

For user identity services, Active Directory is the major tool that IT teams are familiar with. However, Macs can have performance issues when connected directly to it. In order to simplify the process, IT professionals can use tools like Apple Enterprise Connect and Jamf Connected to eliminate the need for local machines connected directly to Active Directory, while also tracking account credentials on local machines. 

This method simplifies the login process for end-users while still giving IT departments the ability to implement policies that require users to change passwords every three months. The easier it is for users to get the technical support they need, the easier it will be for IT to deploy and administer Mac security updates. 

The initial step is to ensure that your Mac device users know who to contact when issues occur. This will ensure users can get the assistance they need effectively and efficiently, reducing the threats or vulnerabilities and speeding the patching process. 

Self-service applications can reduce support desk phone calls and tickets. This is due to users having access to already approved and safe applications whenever they need them. Furthermore, the ability to run maintenance tasks to fix minor issues will also help users feel empowered and ensure little issues get fixed immediately, instead of waiting in the IT queue. 

Are You Ready for Mac Best Practices? 

For IT administrators, especially those without previous experience, initial deployment may seem complex, but with the above Mac patching practices and the business tools offered by Apple, your users can be up and running immediately. 

Vicarius is a vulnerability remediation tool that targets cybersecurity officers as well IT managers and operators from the U.S. market. Our products and services are personalized to your unique business and always incorporate Mac best practices. 

Photo by reza shayestehpour on Unsplash

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×