Cyber Resilience – Do you Know Where your Credentials Are?
With stolen credentials leading the charge as the root cause of many data breaches – and certainly one of the easiest methods – it’s important to monitor the various repositories and forums where credentials are often traded. There are numerous services that offer monitoring for stolen credentials and it’s important to be alerted for all the different types of credentials used or stored across your utility, including employee, customer/consumer, partner/third-party supplier, and VIP (executives and board members).