{"id":69008,"date":"2023-07-20T12:17:22","date_gmt":"2023-07-20T04:17:22","guid":{"rendered":"https:\/\/version-2.com\/?p=69008"},"modified":"2023-07-17T12:17:51","modified_gmt":"2023-07-17T04:17:51","slug":"the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/07\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\/","title":{"rendered":"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"69008\" class=\"elementor elementor-69008\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png\" width=\"800\" height=\"500\" \/>\n<div class=\"fl-module-content fl-node-content\">\n\nPasswords have long been a <a href=\"https:\/\/www.portnox.com\/blog\/are-passwords-a-threat-to-enterprise-security\/\" target=\"_blank\" rel=\"noopener\">weak link<\/a> in the security chain. They can be easily guessed, stolen, or cracked through various malicious techniques. Passwordless login methods eliminate the reliance on passwords altogether, significantly enhancing security. By employing advanced technologies such as public-key cryptography, companies can implement strong <a href=\"https:\/\/www.portnox.com\/solutions\/passwordless-authentication\/\" target=\"_blank\" rel=\"noopener\">authentication protocols<\/a> that are resistant to brute-force attacks, phishing attempts, and credential stuffing.\n\n<img decoding=\"async\" class=\"size-full wp-image-12988 aligncenter entered lazyloaded\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2.png\" sizes=\"(max-width: 1000px) 100vw, 1000px\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2-500x200.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2-768x307.png 768w\" alt=\"passwordless ssh portnox\" width=\"1000\" height=\"400\" data-lazy-srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2-500x200.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2-768x307.png 768w\" data-lazy-sizes=\"(max-width: 1000px) 100vw, 1000px\" data-lazy-src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2.png\" data-ll-status=\"loaded\" \/><noscript><img decoding=\"async\" class=\"size-full wp-image-12988 aligncenter\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2.png\" alt=\"passwordless ssh portnox\" width=\"1000\" height=\"400\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2-500x200.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-1-v2-768x307.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/noscript>\n<h3>Considering Passwordless Login? Here\u2019s What You Need to Know\u2026<\/h3>\nWhen implementing passwordless login methods for network authentication, cybersecurity professionals should consider the following key factors:\n<h5>I. Strong Authentication Protocols<\/h5>\nPasswordless authentication should employ strong authentication protocols, such as <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/public-key-cryptography\/\" target=\"_blank\" rel=\"noopener\">public key cryptography<\/a>. These protocols add an extra layer of security beyond just passwords and provide more robust protection against unauthorized access.\n<h5>II. Secure Credential Storage<\/h5>\nWith passwordless login, sensitive credentials like private keys can be used. It is crucial to ensure secure storage of these credentials, either through encrypted cloud-based storage solutions or hardware-based security modules if necessary. <a href=\"https:\/\/www.portnox.com\/blog\/smartphone-unauthorized-network-access\/\" target=\"_blank\" rel=\"noopener\">Unauthorized access<\/a> to these credentials could lead to serious security breaches.\n<h5>III. User Experience and Adoption<\/h5>\nPasswordless methods should be designed with a focus on user experience to encourage adoption. Complex or cumbersome authentication processes can result in user resistance or workarounds that compromise security. <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/05\/26\/how-to-achieve-balance-between-cybersecurity-and-the-user-experience\/\" target=\"_blank\" rel=\"noopener\">Balancing security and usability<\/a> is crucial for successful implementation.\n<h5>IV. Robust Identity Verification<\/h5>\nPasswordless login should include robust identity verification mechanisms to ensure that the person requesting access is indeed the legitimate user. This can involve factors such as device attestation or contextual information like location or network patterns to establish trust.\n<h5>V. Monitoring and Logging<\/h5>\nIt is essential to implement monitoring and logging mechanisms to track authentication events and detect any suspicious or malicious activities. Security professionals should have visibility into the authentication process to identify potential threats and respond promptly to security incidents.\n<h5>VI. Continual Security Updates and Patches<\/h5>\nPasswordless methods, like any other security solution, may have vulnerabilities that could be exploited by attackers. Vulnerability assessments should be conducted to ensure that the authentication system remains resilient against emerging threats. <a href=\"https:\/\/www.portnox.com\/blog\/10-differences-between-cloud-native-faux-cloud-security-products\/\" target=\"_blank\" rel=\"noopener\">Cloud-native solutions<\/a> can help eliminate the need for continuous patching, updating and general system maintenance.\n<h5>VII. Backup and Recovery Mechanisms<\/h5>\nImplementing passwordless login should also include considerations for backup and recovery mechanisms. In the event of system failures or credential loss, there should be processes in place to restore access securely and without compromising security.\n<h5>VIII. User Education and Awareness<\/h5>\nIntroducing passwordless methods requires educating users about the new authentication methods, their benefits, and best practices. Users should understand the security implications, potential risks, and how to properly use and protect their credentials to maintain a strong security posture.\n\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-2-v2.png\" width=\"1000\" height=\"400\" \/>\n<noscript><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12990 aligncenter\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-2-v2.png\" alt=\"cyber security employee training portnox\" width=\"1000\" height=\"400\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-2-v2.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-2-v2-500x200.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-graphic-2-v2-768x307.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/noscript>\n<h5>IX. Threat Modeling and Risk Assessment<\/h5>\nBefore implementing passwordless authentication, conducting a comprehensive threat modeling and <a href=\"https:\/\/www.portnox.com\/solutions\/endpoint-risk-monitoring\/\" target=\"_blank\" rel=\"noopener\">risk assessment<\/a> is critical. This helps identify potential threats, vulnerabilities, and risks associated with the chosen authentication methods and allows for the implementation of appropriate security controls.\n<h3>The Future of the Passwordless Login Trend<\/h3>\n<div class=\"group w-full text-gray-800 dark:text-gray-100 border-b border-black\/10 dark:border-gray-900\/50 bg-gray-50 dark:bg-[#444654]\">\n<div class=\"flex p-4 gap-4 text-base md:gap-6 md:max-w-2xl lg:max-w-[38rem] xl:max-w-3xl md:py-6 lg:px-0 m-auto\">\n<div class=\"relative flex w-[calc(100%-50px)] flex-col gap-1 md:gap-3 lg:w-[calc(100%-115px)]\">\n<div class=\"flex flex-grow flex-col gap-3\">\n<div class=\"min-h-[20px] flex items-start overflow-x-auto whitespace-pre-wrap break-words flex-col gap-4\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n\nAs the workforce adopts new habits and technologies and cyber threats evolve in parallel, the adoption of passwordless login methods for security authentication is gaining momentum. By eliminating the <a href=\"https:\/\/www.portnox.com\/blog\/are-passwords-a-threat-to-enterprise-security\/\" target=\"_blank\" rel=\"noopener\">weaknesses of traditional passwords<\/a>, companies can enhance security, streamline user experience, and meet compliance requirements. Passwordless authentication provides a robust and convenient solution for organizations seeking to protect sensitive data, accommodate mobile workforces, and reduce the costs associated with password management.\n\nEmbracing this innovative approach empowers companies to strengthen their security defenses, adapt to the changing work environment, and stay resilient in the face of evolving cyber threats.\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Passwords have long been a weak link in the security ch [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1075,61],"tags":[1076,352,423],"class_list":["post-69008","post","type-post","status-publish","format-standard","hentry","category-portnox","category-year2023","category-press-release","tag-1076","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization - Version 2\" \/>\n<meta property=\"og:description\" content=\"Passwords have long been a weak link in the security ch [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T04:17:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization\",\"datePublished\":\"2023-07-20T04:17:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\\\/\"},\"wordCount\":598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/passwordless-login-tile.png\",\"keywords\":[\"2023\",\"Network\",\"Portnox\"],\"articleSection\":[\"Portnox\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/\",\"name\":\"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/passwordless-login-tile.png\",\"datePublished\":\"2023-07-20T04:17:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/passwordless-login-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/passwordless-login-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/moving-to-passwordless-login-9-considerations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/","og_locale":"zh_HK","og_type":"article","og_title":"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization - Version 2","og_description":"Passwords have long been a weak link in the security ch [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/","og_site_name":"Version 2","article_published_time":"2023-07-20T04:17:22+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/07\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization","datePublished":"2023-07-20T04:17:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/07\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\/"},"wordCount":598,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png","keywords":["2023","Network","Portnox"],"articleSection":["Portnox","2023","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/07\/the-osint-framework-how-hackers-can-leverage-it-to-breach-your-organization-2\/","url":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/","name":"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png","datePublished":"2023-07-20T04:17:22+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/07\/passwordless-login-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/moving-to-passwordless-login-9-considerations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"The OSINT Framework: How Hackers Can Leverage it to Breach Your Organization"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hX2","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/69008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=69008"}],"version-history":[{"count":1,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/69008\/revisions"}],"predecessor-version":[{"id":69009,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/69008\/revisions\/69009"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=69008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=69008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=69008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}