UK Donates 225 Million Stolen Passwords To Hack-checking Site

By   ISBuzz Team
Writer , Information Security Buzz | Dec 21, 2021 03:01 pm PST

The BBC reports that UK donates 225 million stolen passwords to hack-checking site.

Subscribe
Notify of
guest
2 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Ben King
Ben King , CSO for EMEA & APAC
December 22, 2021 5:13 pm

<p><strong>Organisations jump to better security as ransomware rises</strong></p>
<p>Over the course of the pandemic, ransomware gangs have developed increasingly polished operations that have moved on from being opportunistic, to being as-a-service utilities available to any enterprising criminal. Not only that, but criminals can access these services for very little money. At a lower price, the technology isn’t necessarily sophisticated, but it often doesn’t need to be to reach the desired goal, especially when run at scale.</p>
<p><strong>Zero-trust to grow – particularly with the finance sector</strong></p>
<p>Security issues continued to be a source of anxiety for the financial sector in 2021. In October, The <a href=\"https://www.bankofengland.co.uk/systemic-risk-survey/2021/2021-h2\" data-saferedirecturl=\"https://www.google.com/url?q=https://www.bankofengland.co.uk/systemic-risk-survey/2021/2021-h2&source=gmail&ust=1640277825286000&usg=AOvVaw1-AteaQoHdc37XhbI5QYoT\">Bank of England </a>surveyed bankers and others in the financial sector, finding that 75% were worried about cyber attacks. Therefore, in 2022, there will be a sustained investment in zero-trust as we continue to see new vulnerabilities and sophisticated malware arise. Mindful of ever growing breaches reported in the media, the industry will come to grips with an ‘assume compromise’ mindset.</p>
<p><strong>The use of self-healing/self-analysing technology will gain traction in Europe</strong></p>
<p>In 2022, we will see AI/ML more proactively utilised to address issues through self-healing. Technologies and applications in IT operations, cybersecurity, smart cities and manufacturing plants are already feasible and will see uptick across all industries next year. For example, we will begin to see regulation of network traffic to improve performance and availability of applications. We may similarly see increased warnings of cyberattacks and breach attempts, and self-correction of temperature and air flow in data centres.</p>

Last edited 2 years ago by Ben King
Jake Moore
Jake Moore , Global Cyber Security Advisor
December 21, 2021 11:02 pm

<p>Troy’s database is an impressive amount of searchable content which can be explicitly trusted and relied upon. The incredible advantage that can comes from stolen passwords is that they can then help people very easily check to see if their credentials are in the list meaning they need to change their passwords. Furthermore, it can often come as a timely reminder that using the same passwords for multiple accounts simply isn’t strong enough in the digital age.  </p>
<p>Password managers are designed to take the hassle out of thinking up a password with the generator function plus it can look after them all in a secure vault online. This is far safer than reusing the same password which may be easily guessed or one day compromised and used to force into your other accounts.</p>

Last edited 2 years ago by Jake Moore

Recent Posts

2
0
Would love your thoughts, please comment.x
()
x