Skip to content

Compromised credentials remained the biggest enterprise security threat in 2022

Compromised credentials remained the biggest enterprise security threat in 2022


2021 was yet another record year for cyber attacks both in terms of breaches and financial damages. While there were banner headlines around high profile vulnerabilities like Log4j and SUNBURST, for the most part they were mitigated with robust patching procedures. The true menace of 2021 was ransomware that included real world impacts that shut down everything from pipelines to local governments. Compromised user credentials are the most common initial attack vector and are ultimately responsible for a full 20% of data breaches. In 2021, the greatest threats to enterprise security efforts remained stolen or forged credentials.

The Security Stakes Are Higher Than Ever

When 82% of users admit they reuse passwords across various accounts, you can understand the enormity of the problem. The fundamental issue with stolen or forged credentials is that they can provide the entry point attackers can leverage to launch other, more damaging attacks. Those entry points are hard to find, too. The Cost of a Data Breach Report 2021 revealed that on average it takes organizations 250 days to recognize that a breach occurred as a result of compromised user credentials. That much time is plenty for a persistent hacker to find other avenues of attack. 


The good news from 2021 is that robust patching procedures work to mitigate these vulnerabilities. Although enterprises know how to do this now, patching isn’t a perfect solution. The hard truth is that some security vulnerabilities are so fundamentally part of a flawed process or product that attackers can bypass any authentication requirement. What can enterprises do then? Understand there will be times when you will be dependent on applying relevant patches to prevent exploitation of a vulnerability, especially when a vulnerability can be buried deeply in third party legacy code or be part of a trusted security product. But counterintuitively, these are exactly the reasons to add more layers of identification requirements to your security efforts. Fraud-proof identification requirements can help build in protection for when patches aren’t yet available while also ensuring that users are protected from the biggest enterprise security threat – themselves.

In 2022, there is no doubt that the largest category of attacks that will impact you will result from stolen or forged credentials. By replacing a reliance on passwords with fraud-proof biometric authentication that meets FIDO2, you can move your security forward and build resilience against any threat that involves stolen or forged credentials. SentryCard evolves authentication with fraud-proof identity verification that cannot be forged and is useless if lost or stolen. With SentryCard, you can ensure every request coming from your users is valid and authorized because it relies on biometric fingerprint matching stored and verified on the card itself.


For more information about how SentryCard can help you build security resilience across your organization and protect you from compromised user credentials, please click here to contact Sentry Enterprises.

Stay up-to-date

The SentryCard platform continues to evolve. Sign up for our email updates.

Request A Demo

Fill out the form below to receive a demo.

To understand visitor behavior and improve our site, we use cookies.  For more information, see our Privacy Policy.