image
Your users’ login credentials are available for sale on the criminal underground — and criminals know it. For the third year running, the 2019 Verizon Data Breach Report calls out the use of weak and stolen credentials as the most common hacking tactic. This podcast is sponsored by SpyCloud The best way to protect your organization is to reset stolen employee and consumer credentials before criminals have a chance to use them against you. But what about partners and vendors, who may have access to your network, your customer data, or your IP? If you have these types of direct relationships, you may have additional exposures. In this sponsored podcast, Threatpost podcast host Cody Hackett talks to Chip Witt, head of product strategy at SpyCloud, about the account takeover risks posed by third parties. For more information from Spycloud about the operationalization of data, click here. [ ](http://iframe%20style=border:%20none%20src=//html5-player.libsyn.com/embed/episode/id/11575619/height/360/theme/legacy/thumbnail/yes/direction/backward/%20height=360%20width=100%%20scrolling=no%20%20allowfullscreen%20webkitallowfullscreen%20mozallowfullscreen%20oallowfullscreen%20msallowfullscreen/iframe) For direct download of the podcast, click…

Source