5 steps to avoid credential dumping attacks

Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks.

User ID + password / credentials / authentication
BlueBay2014 / Getty Images

Credential dumping is a significant technique that attackers use to gain persistent access in a network. They sneak into a workstation via phishing and then leverage the typical ways that admins manage and monitor a network to find exposed credentials.

Any organization might have vulnerabilities that make them susceptible to credential dumping. Here are five ways to identify those vulnerabilities or limit their risk.

1. Limit credential reuse

First, review how you manage your networks. How many times do you log into different network assets from workstations used for other tasks? How many times do you reuse passwords for online accounts as well as on your networks?

To continue reading this article register now

The 10 most powerful cybersecurity companies