2021 ForgeRock Consumer Identity Breach Report

Thumb original forgerock consumer identity breach 2021 report

The year 2020 witnessed a massive digital migration. People did almost everything online – purchasing goods and services, consulting with healthcare professionals, arranging for meal deliveries, distance learning, and, of course, working from home.

Meanwhile, malicious actors did not skip a beat. This year’s report notably reveals that attacks involving usernames and passwords increased a staggering 450% over 2019, translating into more than 1 billion compromised records in the U.S. alone. With users spending more than double the amount of time online,1 their tendency to reuse common passwords continued to make this attack vector extremely attractive to cybercriminals.

Surprisingly, even with all this online activity, the number of mega-breaches decreased in 2020 and, correspondingly, so did the number of records compromised. However, the total number of breaches increased. Those involving less than 100 million records shot up by 50%. For smaller enterprises hoping to be ignored or biding their time in adopting Zero Trust security, 2020 shows us that they must
not wait. Cybercriminals are working their way into organizations of all sizes with the intent to seize valuable assets.

Read this report to find out how usernames and passwords found their way Into the crosshairs of attackers.

View report
Provider: ForgeRock   |   Size: 734 KB   |   Language: English
Keep Reading:
Thumb original how to migrate from oracle access manager to the forgerock identity platform

How to Migrate from Oracle Access Manager to ForgeRock Identity & Access Management

Migrating from Oracle Access Manager (OAM) to ForgeRock Identity & Access Management (IAM)

Looking for an Oracle Access Manager alternative?
Legacy Web Access Management (WAM) systems like Oracle Access Management (OAM) have fundamental gaps that inhibit your business value and impede digital transformation. Fortunately, you can have a modern IAM system co-exist with the current legacy Oracle system, adding immediate value to your business, as you then plan a phased approach to migrate off of the old platform.

In this paper, we d ...

Access this Whitepaper
Thumb original evaluating digital identity providers for ciam

Evaluating Digital Identity Providers for Customer Identity and Access Management

Evaluation Framework for Customer Identity and Access Management
Today, six digital transformation trends are directing how you conduct business. These trends necessitate a different approach to customer identity and access management - one that is all-encompassing for any identity and built for the future.

This highly informative paper helps decision-makers navigate how to evaluate digital identity providers for customer identity and access management (CIAM) based on the six trends. This guide includes definitions and use cases for the mod ...

Access this Whitepaper
Conersational ms365 recovery best practices   en

Microsoft 365 Recovery Best Practices

Recoverability isn’t a given with Microsoft 365. The fact that organizations need to back up their Microsoft 365 deployments has been well established. As important as backups might be, however, there is one critical item that always seems to get left out of the conversation. That item is recoverability. ...

Access this Whitepaper
7 critical reasons for ms365 backup

7 Critical Reasons for Microsoft 365 Backup

You have 7 critical reasons to protect your Microsoft 365 data. This 5-minute easy-to-read document helps you convince your managers and peers that your organization needs Microsoft 365 data protection. ...

Access this Whitepaper
Mircosoft 365 for dummies

Micosoft 365 Backup For Dummies

Get this easy-to-read e-book For Dummies, and learn how to best backup and protect your Microsoft 365 data. It’s your data, it’s your responsibility to protect it! ...

Access this E-Book