Account Takeover Fraud , Endpoint Security , Fraud Management & Cybercrime

OnDemand Webinar | Exploring Third-Party Account Takeover Risk and What to Do About It

Analysis of exposure in the Fortune 1000 and what it means for your enterprise.

123456, password, password1: These are a few of the top passwords used by Fortune 1000 employees whose passwords and personally identifiable information have been exposed in third-party breaches. While the dangers of easy-to-guess passwords are well-known, even employees at top companies are guilty of bad password hygiene.

Criminals actively use weak and stolen credentials for malicious purposes, such as committing account takeover fraud and business email compromise (BEC). If an employee at one of your partners or vendors is compromised, attackers are just one step away from breaching your own enterprise.

Using the largest repository of breached credentials in the world, SpyCloud has analyzed breach data tied to Fortune 1000 employees to understand what information is out there and how it can be used to commit fraud.

In this webinar, SpyCloud Head of Product Strategy: Chip Witt, will walk through SpyCloud's analysis of exposure in the Fortune 1000 and what it means for your enterprise.

About the Author

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.