Everyone is a Target: The State of Account Takeover in the Telecommunications Industry
For every telecom company in the Fortune 1000, there are 552,601 plaintext passwords of employees in the hands of criminals. The telecom industry is up against a wall: there is seemingly unlimited data from both employees and subscribers in the hands of criminals to exploit for profit.
It’s time to stop giving criminals easy targets due to poor password hygiene and common security habits that put individuals and organizations at risk.
In this half-hour webinar, we dive into:
- The underestimated and misunderstood methods cybercriminals are using to take over accounts
- The latest stolen credential statistics specific to the industry that underscore the scope of the problem
- Recommendations for mitigating risk
Bob Lyle, SVP, Vertical Markets
With a background in the device security and IP licensing spaces, he leads SpyCloud’s efforts to engage with key market verticals, including telecommunications and e-commerce, to best serve enterprises and consumers globally and protect them from account takeover (ATO). In parallel, Bob is also the Chair of GSMA’s Device Security Group (DSG), which advises mobile network operators, mobile device OEMs, and mobile ISVs on device security, theft, malware and spyware protections and assists with industry recommendations and standards around device security matters.
The SpyCloud Difference
SpyCloud offers the earliest possible detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach or are for sale on the dark web and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done.
Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.
Check Your Exposure
See your real-time account takeover exposure details powered by SpyCloud data.