2021 Report: Breach Exposure of the Fortune 1000

REPORT

2021 Report: Breach Exposure of the Fortune 1000

SpyCloud 2021 Report: Breach Exposure of the Fortune 1000

Password reuse is a leading cause of account takeover, and it’s an issue for security teams everywhere. Data breaches plague every enterprise, including America’s most successful businesses; but even employees who practice good password hygiene may put their employers at risk when third-party data breaches expose personal data that can be used against them.

To highlight the scope of the problem, SpyCloud analyzed breach data tied to employees of Fortune 1000 companies. For this analysis, we examined over 107 million Fortune 1000 employee breach records containing more than 543 million assets, all of which are available to cybercriminals and can be used for malicious purposes.

  • What kinds of stolen employee data criminals have access to, and the dangers it presents for enterprises
  • The most popular passwords of Fortune 1000 employees
  • How many employee and consumer credentials have been collected by keyloggers
  • Infographics showing credential exposure, password reuse rates, and more for all 21 Fortune 1000 sectors

Download the Report

Solution: Account Takeover Prevention

Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data.

Learn More

The SpyCloud Difference

SpyCloud provides the earliest detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done. 

SpyCloud safeguards more than 2 billion employee and consumer accounts from account takeover and follow-on attacks.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

2021 Remote Workforce Security Report

REPORT

2021 Remote Workforce Security Report

New Security Threats Facing Remote Workers
2021 Remote Workforce Security Report

Following the dramatic rise in work-from-home in the wake of the COVID-19 pandemic, securing the expanding remote workforce has become a critical priority.

The 2021 Remote Workforce Security Report reveals the current state of cybersecurity at widely distributed organizations, including key challenges, new security threats, technology gaps and preferences, investment priorities, and more.

Based on the research, organizations are seeing increased phishing attempts and malware infections. They are concerned about the use of personal, unsecured devices to access corporate applications, and the risk of data leakage presented by a habit so difficult to stop – especially when 55% of organizations allow it.

Download the report for insights & more on:
  • Security controls that are most effective for remote work scenarios
  • Threats users are reporting with increasing frequency
  • Security protocols individuals are most resistant to
  • How remote work is impacting compliance posture, especially regarding GDPR
Examine what your peers think about the ongoing threats and vulnerabilities faced by enterprises today, and where you might need to shore up your defenses for the future – because remote work is a trend very likely to continue.

Get the Report

2021 Remote Workforce
Security Report
Download the PDF version of the report to print or share with others.

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time account takeover exposure details powered by SpyCloud data.

Account Takeover 101

WHITEPAPER

Account Takeover 101

What Is It & What Can You Do to Prevent It?

Account Takeover 101 preview

“Even if you’re familiar with account takeover and think you’re prepared, the truth is it’s a never-ending game of whac-a-mole.”

Account Takeover (ATO) inflicts significant financial harm on businesses and individuals. As a corporate security team, you can’t defend yourself alone, and user habits will continue to put your organization at risk.

Preventing ATO might seem impossible, but vigilance and education offer some of the biggest advantages in beating criminals at their own game. With that in mind, we designed this whitepaper to help you thoroughly understand this ever-evolving threat and take the necessary steps to protect your users and your business.

  • Gain expert-level knowledge of the account takeover timeline
  • Understand user habits that lead to ATO risk and how to mitigate them
  • Know what measures are required to prevent ATO as early as possible

Download Account Takeover 101 [PDF] and see whether you’re doing enough to stop this insidious cyberattack.

Download ATO 101

Solution: Account Takeover Prevention

Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data.

Learn More

A few of our happy customers:

The SpyCloud Difference

SpyCloud provides the earliest detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done. 

Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.

stat-blocks-stacked

Check Your Exposure

See your real-time account takeover exposure details powered by SpyCloud data.

Credential-Stealing Malware: Remediation Guide for Government Security Teams

WHITEPAPER

Credential-Stealing Malware: Remediation Guide for Government Security Teams

Malware Infected User Guide

Many users who have been infected with malware have unknowingly had their account passwords and full browser details recorded and stolen by cybercriminals. Information pilfered by these “botnets” collected by cybercriminals, shared in small circles, and sometimes posted in hacking web forums.

Government agencies can mitigate the risks associated with botnet infections by taking swift action to inform affected users and help them remediate.

Download our guide to learn:

  • How infected users impact your organization, even if the affected systems fall outside of corporate control
  • What it means when employee or consumer information appears on a botnet log
  • How to contact users with an action plan (we provide an email template you can use right away)

Solution:

Account Takeover Prevention
Continuous monitoring prevents fraud against employees and citizens, and protects you from supply chain risks.
Download the PDF version of the whitepaper to print or share with others.

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time account takeover exposure details powered by SpyCloud data.

CISO’s Guide to Surviving a Data Breach

WHITEPAPER

CISO's Guide to Surviving a Data Breach

Surviving a Data Breach
“Remember, they hired you for the tough times. You survive by leading the best you can.”

If 2020 taught us anything, it’s the importance of preparedness. Large-scale data breaches are on the rise, costing an average $3.86 million. It’s time to get serious about your breach prevention and response plans.

Start by seeing how 3 seasoned CISOs survived data breaches that exposed customer data, and came out the other side with proven advice and lessons learned.

Download our guide for advice on:

  • Pre-breach fundamentals
  • Detecting breaches & finding stolen data on the dark web
  • Handling media relations & notifying customers
  • Navigating litigation
  • Long-term security investments & the question of ROI
It’s a rare peek into the full lifecycle of real-world data breaches that will help you be better prepared.
Insights relevant to all industries came from our interviews with:
  • Anthem’s Former CISO, Roy Mellinger
  • Landry’s Former CISO, Damian Taylor
  • CareFirst BlueCross BlueShield’s Former CIO, Harry D. Fox

Download the Guide

CISO’s Guide to Surviving a Data Breach

A few of our happy customers:

The SpyCloud Difference

SpyCloud provides the earliest detection of potentially compromised accounts – those using credentials that have appeared in a third-party breach and are therefore at risk of account takeover. And we automate the remediation of exposed passwords, enabling enterprises to lock down accounts quickly, before damage is done. 

Our goal is to help organizations to protect themselves from criminal activity and disrupt criminals’ ability to profit from stolen data.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

SpyCloud Named 2020 Gartner Cool Vendor in Identity Access Management and Fraud Detection

ANALYST REPORT

SpyCloud Named a 2020 Gartner Cool Vendor in Identity Access Management and Fraud Detection

SpyCloud Gartner Cool Vendor 2020
“Seek insight from specialist intelligence providers to understand where information compromise and loss can harm the enterprise.”1

SpyCloud is one of only three companies recognized in the Gartner 2020 Cool Vendors in IAM and Fraud Detection report.

Findings from the report:

  • New solutions are required to reduce risk at sensitive points in the customer journey, including authentication and enrollment.
  • As the COVID-19 crisis deepens, technology decisions increasingly focus on value for money and user experience. Solutions that can support new modes of work and enhance user trust and safety are finding traction.
  • Fraud detection continues to bolster identity corroboration capability and accuracy, with the focus of attention being persistent identity throughout the customer journey.
Download the full report today to learn more about Gartner’s analysis of the IAM and Fraud Detection market.

Get the Report

Gartner 2020 Cool Vendors in IAM and Fraud Detection

SpyCloud is on a mission to disrupt the cybercriminal economy to eliminate the loss of money, time, and reputation due to online fraud – and ultimately to make the internet a safer place for individuals and businesses.

We’re proud to offer IAM and fraud prevention teams solutions backed by the most current, relevant and truly actionable data recovered directly from the criminal underground within days of a breach occurring.

Discover why Gartner thinks we’re a Cool Vendor!

Download the Report

SpyCloud human intelligence researchers have recovered billions of data breach assets, including stolen passwords and emails that can put enterprises at risk of account takeover

Gartner Disclaimer:
1 Gartner, Cool Vendors in Identity Access Management and Fraud Detection, 5 October 2020, Jonathan Care, Akif Khan, Tricia Phillips, and Felix Gaehtgens.

The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

See how SpyCloud helps your enterprise proactively thwart fraud.

2020 Report: Breach Exposure of the Fortune 1000

REPORT

2020 Report: Breach Exposure of the Fortune 1000

Preview of SpyCloud's 2020 Report: Breach Exposure of the Fortune 1000, which reveals the corporate credential exposure and ATO risks of major enterprises

Employees frequently reuse corporate credentials as personal logins, regardless of security guidelines that prohibit such behavior. When those third-party sites are subject to data breaches, reused employee logins provide easy entry points to corporate systems and networks. In addition to corporate credentials, data breaches expose a wealth of personal information that can enable cybercriminals to bypass security measures, take over accounts, and compromise enterprise networks.

To provide a snapshot of the breach exposure affecting major enterprises, we examined SpyCloud’s entire database to see what breach data we could tie to companies in the Fortune 1000. Across our data set, we were able to identify over 412 million breach assets tied to employees within the Fortune 1000.

Download the report to see:

  • How many Fortune 1000 employees and C-level executives have passwords available to cybercriminals
  • Top passwords of Fortune 1000 employees</li>
  • Infographics showing credential exposure, password reuse rates, and more for all 21 Fortune 1000 sectors
  • Which sector is the worst offender (by far)

Solution:

Account Takeover Prevention
Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data.
Download the PDF version of the report to print or share with others.

Related Resources

Case Study

Top 10 Travel Booking Site

Preventing account takeover begins with monitoring the dark web, but without the ability to match user accounts with a database of exposed credentials, a top 10 travel booking site was vulnerable to attack.

Read More

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

Targeted vs. Automated Account Takeover Attacks

WHITEPAPER

Targeted vs. Automated
Account Takeover Attacks

Account takeover (ATO) occurs when criminals use stolen logins to access user accounts without permission–typically credentials that have been exposed in a third-party breach. Using victims’ accounts, criminals can make fraudulent purchases, drain accounts, steal sensitive data, or move laterally within a target organization.

The vast majority of account takeover attempts are automated credential-stuffing attacks. However, SpyCloud customers report that 80 percent of losses come from just 10 percent of ATO attempts, which are highly targeted and challenging to detect.

Read this whitepaper to learn:

  • The differences between targeted and automated account takeover attacks and why targeted attacks can cause so much damage
  • The five phases of an account takeover attack and the tactics, techniques, and procedures cybercriminals throughout the attack timeline
  • How early detection can help you prevent both targeted and automated account takeover
Solution: Account Takeover Prevention

Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data.

Learn More

Zero Trust

Download the Whitepaper

Targeted vs. Automated Account Takeover Attacks

A few of our happy customers:

Related Resources

Case Study

Top 10 Travel Booking Site

Preventing account takeover begins with monitoring the dark web, but without the ability to match user accounts with a database of exposed credentials, a top 10 travel booking site was vulnerable to attack.

Read More

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

2020 Annual Credential Exposure Report

REPORT

2020 Annual Credential Exposure Report

Every year, the SpyCloud Credential Exposure Report examines the data cybercriminals have been sharing over the last year and what it means for enterprises and consumers. Our 2020 report shows that password reuse continues to be a serious problem, leaving enterprises and their customers vulnerable to account takeover (ATO). 

SpyCloud researchers infiltrate criminal networks to identify and recover stolen data months or years before it reaches a broader criminal audience or goes public. As a result, the 9 billion breach records analyzed for this report provide insight into breaches that have been freshly released to criminal marketplaces over the last year.

Download the report to see:

  • Trends our researchers have observed within cybercriminal communities over the last 12 months
  • Password reuse patterns, including the most common transformations people use to “refresh” a reused password
  • Most popular 100 passwords collected over the last 12 months
  • Common password hashing algorithms used by breached organizations

Solution:

Account Takeover Prevention
Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data.
Download the PDF version of the report to print or share with others.

Related Resources

Case Study

Top 10 Travel Booking Site

Preventing account takeover begins with monitoring the dark web, but without the ability to match user accounts with a database of exposed credentials, a top 10 travel booking site was vulnerable to attack.

Read More

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.

Best Practices for Implementing NIST Password Guidelines

WHITEPAPER

Best Practices for Implementing
NIST Password Guidelines

Weak Passwords? NIST Can Help!

Controlling users’ bad password habits poses a major challenge. Aligning your enterprise’s password policy with the latest guidelines from NIST can help encourage better password habits and reduce the risk of account takeover.

Luckily, you can enforce many of these guidelines through the built-in settings provided by most directory services, including Microsoft Active Directory.

Download this best practices guide to get:

  • A plain-english overview of required, recommended and desirable NIST password guidelines
  • Detailed instructions to help you use directory services like Active Directory to enforce password guidelines
  • Advice for how to keep your password policy human-friendly and help your users help themselves
  • Questions to ask potential solution providers

Solution:

Active Directory Guardian
Automatically detect and reset exposed Windows accounts.
Download the PDF version of the whitepaper to print or share with others.

Related Resources

The SpyCloud Difference

Truly Actionable Recaptured Data

SpyCloud solutions are backed by the world’s most current and comprehensive repository of recaptured data from breaches, malware infections, and other underground sources – with billions of exposed credentials and PII. It’s the same data that fraudsters use, but we make it actionable to prevent account takeover, ransomware attacks, and online fraud.

stat-blocks-stacked

Check Your Exposure

See your real-time breach exposure details powered by SpyCloud data.