By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: 5 tips against data violations for identity theft
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > 5 tips against data violations for identity theft
Mobile

5 tips against data violations for identity theft

News Room
Last updated: 2025/04/07 at 8:35 AM
News Room Published 7 April 2025
Share
SHARE

Tomorrow, April 8, an identity management day is celebrated, an anniversary to remember the importance of protect against identity theft and security violations They usually carry. And it is that 79% of data leaks are related to identity theft and cost companies an average of 4.5 million dollars, according to reports from the Alliance for Security Defined by Identity (IDSA) (Identity Defined Security Alliance) and the Ponmon Institute.

In addition, the 2025 edition of the Active Adversary Report of Sophos reveals that the average time between the start of an attack and the exfiltration of data is only 72.98 hours (3.04 days), while the average time between the exfiltration and the detection of the attack is only 2.7 hours. Cyber ​​attacks are increasingly fastand the longer a compromised identity remains active, the greater the potential damage will be.

Cybercriminals can use a committed identity to access confidential information, steal data, move laterally inside the company and launch new attacks. Therefore, it is crucial to take immediate measures to contain the gaps and minimize their consequences. In this context, automation plays a key role by allowing companies to respond quickly and effectively to identity -related threats as Álvaro Fernández, sales director at Sofos Iberia points out:

«Identities management is essential for robust cybersecurity. A quick and efficient response to an identity gap is crucial to minimize damage and protect the assets of a company. Through awareness, with days such as this day of identities management, it is highlighted that prevention, together with a coordinated response, mitigates the risks associated with identity gaps ».

How to protect against identity theft

Coinciding with identity management day, Sophos researchers have remembered a series of tips to manage and protect identities:

1. disable the user. When an identity violation is detected, one of the first steps is to deactivate the compromised user account. By preventing the attacker from using the stolen identity to access the company’s systems and data, this measure is advanced to the cyber -struggle and helps contain the gap.

Automation considerably accelerates this process. With automated response tools, companies can quickly identify compromised accounts and deactivate them in real time. This reduces the attack window and minimizes potential damage.

2. Force the restoration of the password. Passwords are often the first line of defense against unauthorized access attempts. In case of identity violation, it is essential to immediately force the restoration of the password of the committed account to prevent cyberbellors from using stolen credentials.

Automated rules can be configured to activate instantaneous password restoring as soon as a violation is detected. This saves time and guarantees that the recovery process begins without delay, reducing the risk of new unauthorized access attempts.

3. Cause the restoration of multifactor authentication (MFA). Multifactor authentication (MFA) adds an additional security layer when demanding users to enter a verification code, in addition to their password. If an identity violation occurs, it is crucial to restore the MFA for the committed account. This means that the user will have to be authenticated again using their MFA tool, which automatically invals any stolen authentication token that cyber -stakeholders may have acquired.

Automated rules can activate the update of MFA tokens, guaranteeing a rapid re -authentication of compromised accounts. This prevents cybercounts from using stolen authentication tokens to access company systems.

4. Block the account. Blocking a compromised account prevents cyberbellors from trying to use it until the problem is solved. This also provides time to the company to investigate the gap and apply the necessary corrective measures.

Automation speeds up the accounts blocking process, allowing companies to prevent access to committed accounts as soon as a gap is detected. This immediate response helps contain the gap and blocks new unauthorized access attempts.

5. Revoke active sessions. In addition to deactivating the user account and forcing password restoration, it is essential to revoke all active sessions associated with the committed identity. In this way, it is guaranteed that the attacker immediately disconnected from all the systems he accessed using stolen credentials.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Deep Robotics delivers robot SPock for Singapore Power Group · TechNode
Next Article IT never sleeps – a 24×7 approach to serving customers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

“They know our name”: Day 1-1000 of Union Systems
Computing
Apple just released an interesting coding language model – 9to5Mac
News
I Brought My Dad Back to Life With This Phone. I Don't Know How to Feel
News
A covered engineer was secretly caught working for several startups of Silicon Valley at the same time solving salary offers of a maximum of $ 200k per job
News

You Might also Like

Mobile

What cars can circulate and which ones rest on July 5

5 Min Read
Mobile

The ia of the Xiaomi SU7 thinks that this Chinese driver falls asleep

3 Min Read
Mobile

Survival Unit Set To Bring Real-Time Strategy To Phones On July 10

3 Min Read
Mobile

QSYNC 6.0, the QNAP solution for comprehensive data treatment

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?