Advertisement
Top

Eliminate Weak Passwords With Regular Auditing

August 17, 2016

End user auditing consists of ensuring security policies — such as password requirements — and due care is provided to sensitive documents.

Clients regularly ask IBM’s X-Force Incident Response team to scan their networks for intrusions, malicious activities or other risk factors. One such risk factor that we look for is the use of weak passwords. As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.

Read More on Security Intelligence