After all the education, all the measures, there are two almost inevitable truths in IT security: Some users will reuse their passwords and data breaches will happen—leading to exposed and misused credentials.
These two facts combined spell trouble. Account takeover kind of trouble.
Your own password strategy is likely solid. You use strong, unique passwords, enabled multi-factor authentication whenever you could—modern-day table stakes, right?
Do you think everyone in your organization is as careful? You never know whether their Outlook or Salesforce password isn’t the same one they used to sign up for a Smash Mouth fan forum running on vBulletin, last updated in 2011.
We’re not even talking about your organization when it comes to data breaches—the IT pros do their best to ensure breaches won’t happen. But that vBulletin forum is easy pickings. Once breached, the hacker has half of what they need—the password. Even serious services and organizations are regularly breached and pilfered.
What to do about it? Other than to think “We’re not an interesting-enough target” (false) or it’s not something to worry about (false).
We’re excited to have a new tool to help you get some power back to your hands: SolarWinds® Identity Monitor. We’ve partnered up with security experts at SpyCloud to give you a chance to act before the bad actors do.
In true SolarWinds fashion, Identity Monitor is an easy-to-use product:
You sign up with your business email address, add any other company email domains to a watchlist and then get notified whenever any of the emails and credentials belonging to your organization have appeared in a data breach. You also have access extensive past breach history for your monitored domains.
With an early notification, you can act and protect your accounts from account takeover attempts, for example forcing a password reset.
Ready to see where you stand? Start with a free check of your email breach exposure and see the stats of how many personal records in your domain were exposed and when. Fingers crossed!