Controls

Cybersecurity Myths That Are Harming Your Business

Cybersecurity experts are falling prey to seven myths in the effort to protect their business. Shape's Daniel Woods writes for Forbes, explaining where these myths have led us astray, and how to keep the useful bits while discarding the chaff.
July 02, 2020
1 min. read

There's something undeniably compelling about a good myth. Maybe that's because a dose of escapism does our brain good, and it's fun to spend a few moments wondering about deadly alligators populating the New York City sewer system or Walt Disney's cryogenically frozen head waiting to be brought back to life.

But while those myths are fun, some of the myths about cybersecurity are downright dangerous. That's because a misunderstanding of what does and does not protect your digital footprint can lead to devastating breaches. It's time to bust the myths and get back to better protection. Here are seven of them:

1. Multi-factor authentication prevents credential stuffing.

Multi-factor authentication is a great tool in cybersecurity, but it doesn't prevent credential stuffing. Here's why: When a hacker tries to log in with incorrect credentials, the server will respond with an error message. When the credentials are correct, the server will ask for a second factor of authentication. Either way, the attacker gains information, and any information can be used to aid in an attack.

Read the full article published June 11, 2020 here: https://www.forbes.com/sites/forbestechcouncil/2020/06/11/cybersecurity-myths-that-are-harming-your-business/ by Forbes.

Join the Discussion
Authors & Contributors
Dan Woods (Author)
Global Head of Intelligence

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read