Beth Grayson author photo

Beth Grayson

Beth is a cybersecurity writer based in the UK, with 3+ years’ experience writing about B2B and technology topics.

Articles written by Beth Grayson

  • Password manager security: Are password managers really safe?

    Strong password security calls for a unique password for each account we use. But with our online lives growing increasingly complex, spreading across potentially hundreds of accounts, it’s becoming nearly impossible for users to remember and keep track of all…

    Read More
  • Cloud network graphic

    How to secure hybrid cloud environments: Best practices for cloud password security

    As more organizations adopt cloud-first or hybrid IT strategies, identity and access management (IAM) has taken on a new level of complexity. According to a recent report from Flexera, 89% of enterprises now use a multi-cloud strategy, with many maintaining…

    Read More
  • Image of password written on a sticky note

    The risk of default passwords: What they are & how to stay safe

    Cyberattacks are evolving rapidly. As technology advances, so do the tools and techniques used by hackers, from AI-driven phishing schemes to highly targeted ransomware attacks. But despite this increasing sophistication, many successful breaches still rely on something shockingly simple: default…

    Read More
  • Image of someone typing on a laptop while holding a credit card

    HMRC phishing attack: How stolen credentials enabled tax fraud

    His Majesty’s Revenue and Customs (HMRC) recently announced that it has been hit by a sophisticated phishing scam, which resulted in the theft of approximately £47 million ($63.76 million) from over 100,000 taxpayer accounts. The attack took place in 2024,…

    Read More
  • A padlock resting on a computer keyboard

    Password encryption: What is it and how does it work?

    As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense against…

    Read More
  • Image of login page

    Credential harvesting: How it works & tips for prevention

    Credential harvesting represents a serious threat to organizations of all kinds – particularly in today’s digital landscape, where virtually every enterprise depends on user credentials for access and security.   According to IBM’s 2025 Threat Intelligence Index, nearly a third (30%)…

    Read More
  • ransomware attacker with hood

    Password mask attacks explained: What are they & how do they work?

    Credential-based attacks remain one of the most effective techniques used by cybercriminals to breach enterprise networks. In 2024 alone, 88% of web application attacks involved the use of stolen credentials, according to Verizon’s 2025 Data Breach Investigations Report. Among these…

    Read More
  • Secure identity verification best practices

    Modern threats demand modern responses. In 2025, credential theft has surged by 160%, now contributing to 20% of data breaches. You’re not just fighting weak passwords anymore — AI-driven phishing and automated malware are creating new risks every day. That's why…

    Read More
  • What is cyber insurance and why do you need it?

    Cyber insurance – also known as cyber liability insurance or cyber risk insurance – covers an organization’s liability for a data breach involving sensitive customer information. As security threats continue to grow, businesses should operate under the assumption that they…

    Read More
  • Leetspeak passwords – predictable and crackable

    Leetspeak — sprinkling your password with “4”s for “A,” “0”s for “O,” “$”s for “S” — has become a go‑to trick for users trying to satisfy complexity rules while keeping something vaguely memorable (e.g. P4$$w0rd). But the hard truth is…

    Read More

Free Active Directory Auditing Tool!