SlideShare a Scribd company logo
HowPasswordsare
costly
SWIPE TO
LEARN
Just because you don’t have to
pay anything extra to buy this
common form of authentication, it
doesn’t mean that passwords are
free. Far from it, quite often
passwords end up costing
enterprises much more than what
they have bargained for.
www.mojoauth.com
SWIPE TO
LEARN
www.mojoauth.com
Passwords have become an integral
part of our lives, with the average user
having around 100 passwords to
manage.
A password breach can jeopardize
personal and financial information,
making it overwhelming and risky.
Reusing passwords across multiple
accounts can further escalate the
security risks.
SWIPE TO
LEARN
Once the password database is
compromised, all passwords become
useless, and a single breach can
compromise security credentials and
private resources.
www.mojoauth.com
Organizations have to ensure password
security as a lot is at stake if an
attacker gets access to the password
database.
SWIPE TO
LEARN
www.mojoauth.com
What is the problem with
passwords?
Password attacks are evolving and are
responsible for 81% of breaches, with
insider threats costing upwards of
$600,000 per incident. Organizations
relying on third-party services are at
higher risk of breaches and may be left
unaware of their vulnerability. Password
issues and resets are a significant cause
of support calls, costing a 10,000-
employee organization an average of
$100,000/year.
SWIPE TO
LEARN
www.mojoauth.com
What is the problem with
passwords?
Password attacks are evolving and are
responsible for 81% of breaches, with
insider threats costing upwards of
$600,000 per incident. Organizations
relying on third-party services are at
higher risk of breaches and may be left
unaware of their vulnerability. Password
issues and resets are a significant cause
of support calls, costing a 10,000-
employee organization an average of
$100,000/year.
SWIPE TO
LEARN
What are typical attacks
against passwords?
www.mojoauth.com
Attacks on passwords vary in cost and
complexity. Some of the most popular
episodes are:
SWIPE TO
LEARN
Brute force attacks
www.mojoauth.com
An encrypted blob is obtained
containing credentials of interest (such
as the SAM database). It can then use a
computer rig to crack through the
database until the passwords are
revealed.
SWIPE TO
LEARN
Credential stuffing
www.mojoauth.com
A database of compromised credentials
is loaded and tested against the system
hoping that one or more credentials in
the database match a legitimate user.
SWIPE TO
LEARN
Shoulder surfing
www.mojoauth.com
Personal information or confidential
information is stolen by peering over
the target’s shoulders. By its nature, it’s
often used by insider threat actors.
SWIPE TO
LEARN
Password spraying:
www.mojoauth.com
A list of commonly used passwords is
replayed, hoping that one of them is
being used by a legitimate user. It is
estimated that 16% of password attacks
are performed using password spraying.
SWIPE TO
LEARN
Phishing:
Phishing attacks, where an attacker impersonates
a trusted source or creates a sense of urgency,
are responsible for the majority of password
breaches. Attackers use links to exploit kits or
malware-infected documents to exfiltrate
credentials from unsuspecting users..
www.mojoauth.com
SWIPE TO
LEARN
What is the Solution?
To avoid password leaks, passwordless
authentication verifies the user based on a
possession or inherent factor, removing the need
to memorize multiple passwords. This can be
done with options like magic links, email OTP,
webAuthn, and phone login.
www.mojoauth.com
MojoAuth offers a reliable, secure, and convenient
passwordless authentication feature.

More Related Content

PPTX
Better Passwords = Better Security
PDF
W make107
PDF
Password Strength Policy Query
PPTX
P@ssw0rds
PDF
Why is password protection a fallacy a point of view
PPTX
The Top Password Security Trends
PPTX
Improving Password Based Security
PPTX
Password Cracking
Better Passwords = Better Security
W make107
Password Strength Policy Query
P@ssw0rds
Why is password protection a fallacy a point of view
The Top Password Security Trends
Improving Password Based Security
Password Cracking

Similar to How passwords are costly (20)

PPTX
Password management
PPTX
Securing password
PDF
OlgerHoxha_Thesis_Final
PDF
PASSWORD BEST PRACTICES
PDF
Password Attacks.pdf
PPTX
Why do we need strong passwords?
PDF
Why is password protection a fallacy a point of view
PDF
Password Management
PDF
Exploring Password Attacks: Understanding Different Types.pdf
PDF
Password Attack and its Types- InfosecTrain.pdf
PDF
Password Attack and its Types-1.pdf
PPTX
Password Management System: Enhancing Security and Efficiency
PDF
Password and Account Management Strategies - April 2019
PPTX
Password Security
PPTX
Password - Strong and Memorable Passwords
PDF
How to choose a password that’s hard to crack
DOCX
Password Cracking
PPTX
Passwords
PPTX
Brute force-attack presentation
Password management
Securing password
OlgerHoxha_Thesis_Final
PASSWORD BEST PRACTICES
Password Attacks.pdf
Why do we need strong passwords?
Why is password protection a fallacy a point of view
Password Management
Exploring Password Attacks: Understanding Different Types.pdf
Password Attack and its Types- InfosecTrain.pdf
Password Attack and its Types-1.pdf
Password Management System: Enhancing Security and Efficiency
Password and Account Management Strategies - April 2019
Password Security
Password - Strong and Memorable Passwords
How to choose a password that’s hard to crack
Password Cracking
Passwords
Brute force-attack presentation

More from Andy32903 (10)

PDF
Top 5 Alternatives of Auth0.pdf
PDF
SSO - Build v/s Buy
PDF
Insider Attacks Understanding the Threat and Strategies for Prevention.pdf
PDF
The Spotight is On Passwordless Authentication
PDF
What is JWT.pdf
PDF
Password Alternatives
PDF
Password reset email best Practices
PDF
MFA vs. SSO: What is the Difference?
PDF
7 Tips for Low Friction Authentication.pdf
PDF
Best Practices for Multi-factor authentication
Top 5 Alternatives of Auth0.pdf
SSO - Build v/s Buy
Insider Attacks Understanding the Threat and Strategies for Prevention.pdf
The Spotight is On Passwordless Authentication
What is JWT.pdf
Password Alternatives
Password reset email best Practices
MFA vs. SSO: What is the Difference?
7 Tips for Low Friction Authentication.pdf
Best Practices for Multi-factor authentication

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
project resource management chapter-09.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Hybrid model detection and classification of lung cancer
Approach and Philosophy of On baking technology
Heart disease approach using modified random forest and particle swarm optimi...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1 - Historical Antecedents, Social Consideration.pdf
project resource management chapter-09.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A comparative analysis of optical character recognition models for extracting...
OMC Textile Division Presentation 2021.pptx
cloud_computing_Infrastucture_as_cloud_p
DP Operators-handbook-extract for the Mautical Institute
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Digital-Transformation-Roadmap-for-Companies.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Group 1 Presentation -Planning and Decision Making .pptx
1. Introduction to Computer Programming.pptx
Chapter 5: Probability Theory and Statistics
Hybrid model detection and classification of lung cancer

How passwords are costly

  • 1. HowPasswordsare costly SWIPE TO LEARN Just because you don’t have to pay anything extra to buy this common form of authentication, it doesn’t mean that passwords are free. Far from it, quite often passwords end up costing enterprises much more than what they have bargained for. www.mojoauth.com
  • 2. SWIPE TO LEARN www.mojoauth.com Passwords have become an integral part of our lives, with the average user having around 100 passwords to manage. A password breach can jeopardize personal and financial information, making it overwhelming and risky. Reusing passwords across multiple accounts can further escalate the security risks.
  • 3. SWIPE TO LEARN Once the password database is compromised, all passwords become useless, and a single breach can compromise security credentials and private resources. www.mojoauth.com Organizations have to ensure password security as a lot is at stake if an attacker gets access to the password database.
  • 4. SWIPE TO LEARN www.mojoauth.com What is the problem with passwords? Password attacks are evolving and are responsible for 81% of breaches, with insider threats costing upwards of $600,000 per incident. Organizations relying on third-party services are at higher risk of breaches and may be left unaware of their vulnerability. Password issues and resets are a significant cause of support calls, costing a 10,000- employee organization an average of $100,000/year.
  • 5. SWIPE TO LEARN www.mojoauth.com What is the problem with passwords? Password attacks are evolving and are responsible for 81% of breaches, with insider threats costing upwards of $600,000 per incident. Organizations relying on third-party services are at higher risk of breaches and may be left unaware of their vulnerability. Password issues and resets are a significant cause of support calls, costing a 10,000- employee organization an average of $100,000/year.
  • 6. SWIPE TO LEARN What are typical attacks against passwords? www.mojoauth.com Attacks on passwords vary in cost and complexity. Some of the most popular episodes are:
  • 7. SWIPE TO LEARN Brute force attacks www.mojoauth.com An encrypted blob is obtained containing credentials of interest (such as the SAM database). It can then use a computer rig to crack through the database until the passwords are revealed.
  • 8. SWIPE TO LEARN Credential stuffing www.mojoauth.com A database of compromised credentials is loaded and tested against the system hoping that one or more credentials in the database match a legitimate user.
  • 9. SWIPE TO LEARN Shoulder surfing www.mojoauth.com Personal information or confidential information is stolen by peering over the target’s shoulders. By its nature, it’s often used by insider threat actors.
  • 10. SWIPE TO LEARN Password spraying: www.mojoauth.com A list of commonly used passwords is replayed, hoping that one of them is being used by a legitimate user. It is estimated that 16% of password attacks are performed using password spraying.
  • 11. SWIPE TO LEARN Phishing: Phishing attacks, where an attacker impersonates a trusted source or creates a sense of urgency, are responsible for the majority of password breaches. Attackers use links to exploit kits or malware-infected documents to exfiltrate credentials from unsuspecting users.. www.mojoauth.com
  • 12. SWIPE TO LEARN What is the Solution? To avoid password leaks, passwordless authentication verifies the user based on a possession or inherent factor, removing the need to memorize multiple passwords. This can be done with options like magic links, email OTP, webAuthn, and phone login. www.mojoauth.com MojoAuth offers a reliable, secure, and convenient passwordless authentication feature.