Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 24 May 2017 09:19

Hacked passwords cause 81% of data breaches

Déjà vu! Centrify warns the rising rate of data breaches from weak or stolen passwords shows today’s security is not working

Centrify, the leader in securing hybrid enterprises through the power of identity services, has highlighted the fact that four of five data breaches during 2017 involved compromised credentials.

Citing the 2017 Verizon Data Breach Investigations Report (DBIR), Centrify Senior Director APAC Sales Niall King said these latest statistics were a case of deja vu. “For years, we’ve seen compromised credentials as a primary cause of data breaches,” he said.

“Verizon’s report states that the number of data breaches involving stolen or weak passwords has gone from 50 per cent to 66 per cent to 81 per cent during the past three years. This alarming trend clearly illustrates that today’s security isn’t working.

“Cyber criminals find the path of least resistance to their target and today that path leads straight from users with self-managed ‘simple factor’ passwords. Since most recent breaches leveraged privileged credentials to gain access to the organisation, securing privileged access in today’s hybrid enterprise is mandatory in achieving a mature risk posture. Passwords alone are not enough.

“While most privilege solutions traditionally vaulted the credentials for shared accounts on-premises, password vaults alone do not provide the level of privileged access security required to stop the breach. Organisations need is a truly integrated solution that combines password vaulting with brokering of identities, MFA enforcement and just-enough and just-in-time privilege, that secures remote access and monitors all privileged sessions.”

Centrify’s single platform secures each user’s access to apps and infrastructure through the power of identity services. It provides adaptive, risk-based access across applications, endpoints and infrastructure. It also offers unique

Privileged Identity Management capabilities for moving an organisation from static, long-lived privilege assignments to a just-in-time model where advanced monitoring detects and alerts in real-time when backdoor accounts are created to make it easy to bypass a password vault.

In addition, leaders like Centrify are delivering smarter risk-based MFA to enterprises. By understanding the individual behaviour profile of each user through sophisticated machine-learning techniques, each individual access attempt can be automatically scored as to the level of risk.

For instance, an office worker who follows a set routine by typically logging in from a known device is identified as low risk, allowing immediate access to resources without extra authentication. However, logins from another country, after hours or from an unfamiliar device is flagged as a high risk, so would be blocked or at least required to provide extra authentication factors.

“Reducing the friction for users through more choices in authentication factors, fewer prompts and a more consistent user experience, will go a long way toward reducing reliance on passwords alone,” said Mr King. “The bottom line is that moving beyond password-only security pays off.”

Centrify-sponsored research by Forrester reports that enterprises with mature identity and access management systems experience half the number of data breaches, avoid about $5 million in data breach costs and spend 40 per cent less on identity technology. For more information, click here.

For media assistance in Australia and New Zealand, call John Harris on +61 8 8431 4000 or email

About Centrify Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognised leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user’s access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5000 customers, including over half the Fortune 50 in the US, to defend their organisations. To learn more visit The Breach Stops Here. ### Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

Cool Tech

Toys for Boys

Skywatcher Dobsonian 8″ Collapsible Telescope

Learn more >

Family Friendly

Whodunnit™ Duo-Scope MFL-007 Microscope Kit

Learn more >

Stocking Stuffer

Logitech Ultimate Ears Wonderboom 2 Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest Articles


PCW Evaluation Team

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?