This website uses cookies to ensure you get the best experience on our website. Learn more
Articles written by Beth Grayson
-
Aug
21
How to secure hybrid cloud environments: Best practices for cloud password security
As more organizations adopt cloud-first or hybrid IT strategies, identity and access management (IAM) has taken on a new level of complexity. According to a recent report from Flexera, 89% of enterprises now use a multi-cloud strategy, with many maintaining…
Read More -
Jul
03
The risk of default passwords: What they are & how to stay safe
Cyberattacks are evolving rapidly. As technology advances, so do the tools and techniques used by hackers, from AI-driven phishing schemes to highly targeted ransomware attacks. But despite this increasing sophistication, many successful breaches still rely on something shockingly simple: default…
Read More -
Jun
06
HMRC phishing attack: How stolen credentials enabled tax fraud
His Majesty’s Revenue and Customs (HMRC) recently announced that it has been hit by a sophisticated phishing scam, which resulted in the theft of approximately £47 million ($63.76 million) from over 100,000 taxpayer accounts. The attack took place in 2024,…
Read More -
May
29
Password encryption: What is it and how does it work?
As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense against…
Read More -
May
19
Credential harvesting: How it works & tips for prevention
Credential harvesting represents a serious threat to organizations of all kinds – particularly in today’s digital landscape, where virtually every enterprise depends on user credentials for access and security. According to IBM’s 2025 Threat Intelligence Index, nearly a third (30%)…
Read More -
Jan
16
Password mask attacks explained: What are they & how do they work?
Credential-based attacks remain one of the most effective techniques used by cybercriminals to breach enterprise networks. In 2024 alone, 88% of web application attacks involved the use of stolen credentials, according to Verizon’s 2025 Data Breach Investigations Report. Among these…
Read More -
Mar
28
Secure identity verification best practices
Modern threats demand modern responses. In 2025, credential theft has surged by 160%, now contributing to 20% of data breaches. You’re not just fighting weak passwords anymore — AI-driven phishing and automated malware are creating new risks every day. That's why…
Read More -
Oct
16
What is cyber insurance and why do you need it?
Cyber insurance – also known as cyber liability insurance or cyber risk insurance – covers an organization’s liability for a data breach involving sensitive customer information. As security threats continue to grow, businesses should operate under the assumption that they…
Read More -
Aug
31
Leetspeak passwords – predictable and crackable
Leetspeak — sprinkling your password with “4”s for “A,” “0”s for “O,” “$”s for “S” — has become a go‑to trick for users trying to satisfy complexity rules while keeping something vaguely memorable (e.g. P4$$w0rd). But the hard truth is…
Read More -
Apr
19
Password reset best practices for helpdesk
According to research from Forrester, a significant percentage of calls to the helpdesk are relating to password problems, with each password reset costing an average of $70 to carry out. Implementing a self-service password reset solution is a great way…
Read More