> On 22. Apr 2020, at 19.14, Michael Peddemors <mich...@linuxmagic.com> wrote: > The three most common attack vectors, (and attack volumes have never been > higher) are: > > * Sniffed unencrypted credentials > (Assume every home wifi router and CPE equipment are compromised ;) > * Re-used passwords where data is exposed from another site's breach > (Users WANT to re-use passwords, this is where 2FA shines) > * Weak Passwords > (Users like using weak passwords, so implement password restrictions) Actually by far the biggest source of stolen credentials is viruses/trojans harvesting them. Sami
- Recommendations on intrusion prevention/detection? Johannes Rohr
- Re: Recommendations on intrusion prevention/detecti... Aki Tuomi
- Re: Recommendations on intrusion prevention/detecti... lists
- Re: Recommendations on intrusion prevention/detecti... Michael Peddemors
- Re: Recommendations on intrusion prevention/det... Sami Ketola
- Re: Recommendations on intrusion prevention... Benny Pedersen
- Re: Recommendations on intrusion preven... Aki Tuomi
- Re: Recommendations on intrusion p... Benny Pedersen
- Re: Recommendations on intrusion prevention/detecti... Joseph Tam
- Re: Recommendations on intrusion prevention/detecti... byalefp
- Re: Recommendations on intrusion prevention/det... Michael Peddemors
- Re: Recommendations on intrusion prevention/det... Remo Mattei
- Re: Recommendations on intrusion prevention/detecti... Plutocrat