Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Useful resource-constrained picture technology and visible understanding: an interview with Aniket Roy

April 7, 2026

Tech and Science Sure for Low Earth Orbit

April 7, 2026

Media King picks Nigeria as first cease in Africa’s public WiFi push

April 7, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Useful resource-constrained picture technology and visible understanding: an interview with Aniket Roy
  • Tech and Science Sure for Low Earth Orbit
  • Media King picks Nigeria as first cease in Africa’s public WiFi push
  • Is your knowledge integrity framework only a fancy spreadsheet?
  • Prime 6 Translation Firms for Startup Go-To-Market in New International locations
  • Anchor Browser Launches OmniConnect, Eliminating the #1 Reason for Enterprise Pc Use Failure
  • 4 Researchers from Keck Faculty of Medication of USC Elected Senior Members
  • Gudsho Social vs Hootsuite vs Later: Which One is Higher?
Tuesday, April 7
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - The Hidden Value of Recurring Credential Incidents
Cybersecurity & Digital Rights

The Hidden Value of Recurring Credential Incidents

NextTechBy NextTechApril 7, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
The Hidden Value of Recurring Credential Incidents
Share
Facebook Twitter LinkedIn Pinterest Email


When speaking about credential safety, the main focus normally lands on breach prevention. This is sensible when IBM’s 2025 Value of a Information Breach Report places the typical price of a breach at $4.4 million. Avoiding even one main incident is sufficient to justify most safety investments, however that headline determine obscures the extra persistent issues attributable to recurring credential incidents.

Account lockouts and compromised credentials don’t make the information. They present up as repeated helpdesk tickets, interrupted workflows, and time pulled away from higher-value work. Individually, every incident appears minor, however collectively they place a fixed burden on IT groups and the broader enterprise.

The actual price doesn’t simply sit within the breach you may forestall, however within the day-to-day disruption you’re already dealing with.

Repeated incidents equal repeated prices

If a corporation finds itself affected by credential-based assaults or repeated account compromises, the plain response is to tighten password insurance policies. Nonetheless, many organizations battle to stability safety with usability. And when one thing doesn’t work, the helpdesk will get the name.

Forrester estimates that password resets account for as much as 30% of all helpdesk tickets, with each costing round $70 once you consider employees time and misplaced productiveness. For a mid-sized group, that’s a big, ongoing operational price tied on to credential incidents.

Disruptions like these construct up and imply IT groups spend most of their time firefighting whereas finish customers lose momentum. The group absorbs the fee in methods which can be simple to miss, however exhausting to remove.

How poor password insurance policies contribute to credential incidents

When customers are met with imprecise error messages like “doesn’t meet complexity necessities,” they’re left guessing. Which rule did they break? What’s lacking? After a number of failed makes an attempt, most customers cease attempting to grasp the coverage and begin on the lookout for the quickest method by it.

Individuals fall again to reusing previous passwords with minor tweaks or storing credentials insecurely simply to keep away from going by the method once more. None of that is malicious, but it surely will increase the chance of repeated credential-related incidents, from lockouts to account compromise.

With none type of breached password screening, organizations depend on time-based resets to handle danger. However a password doesn’t change into unsafe as a result of it’s previous. It turns into unsafe when it’s uncovered. 

Even with quick expiry intervals, customers can proceed logging in with credentials which have already been uncovered in breaches. These accounts are vulnerabilities ready to be exploited, however with out visibility into that, you’re successfully leaving it to likelihood.

At the identical time, IT groups are nonetheless coping with the operational impression of pointless resets with out addressing the underlying danger. With out the power to detect uncovered credentials, organizations are left managing signs as an alternative of the foundation trigger, and the cycle of incidents continues.

It’s right here that instruments like Specops Password Coverage assist. Its Breached Password Safety characteristic constantly scans your person accounts towards a database of greater than 5.8 billion compromised passwords. If a password seems in our database, customizable alerts immediate customers to reset, shortening the window of alternative for attackers to abuse these credentials.

SPP GIF V4 1
Specops Password Coverage

Necessary periodic resets compound password points

For a few years, pressured password resets had been handled as a baseline safety measure. In follow, they have a tendency to create extra issues than they clear up.

When customers are required to vary passwords each 60 or 90 days, habits turns into predictable. Individuals make small, incremental modifications to present passwords or select one thing simple to recollect underneath time strain. The end result isn’t stronger credentials, however extra susceptible ones.

Past creating weaker passwords, these fastened expiration intervals introduce common disruption into the working day. Each reset is a possible lockout, including to the mounting pile of helpdesk tickets that drain your assets with out really bettering your safety posture. 

This is why steering from our bodies like NIST has moved away from necessary periodic modifications in direction of solely resetting passwords when there’s proof of a breach. Whereas eradicating password resets fully requires cautious consideration, up to date steering ought to immediate a rethink of arbitrary expiration dates.

Sturdy password insurance policies set the baseline for identification safety

It’s simple to deal with passwords as a legacy drawback and one thing to reduce as you progress in direction of passwordless authentication. Nonetheless, passwords nonetheless underpin identification safety. If that basis is weak, the impression exhibits up all over the place.

Compromised or simplistic passwords introduce danger on the identification layer, the place attackers can achieve professional entry and transfer laterally with out elevating instant alarms. 

By implementing strong, user-friendly necessities and figuring out uncovered credentials early, you scale back the variety of weak entry factors throughout your setting. This turns into particularly necessary as organizations evolve their authentication methods.

bpp
Specops Breached Password Safety constantly blocks over 5 billion breached passwords

Passwordless nonetheless depends upon robust underlying credentials. And not using a strong baseline, you danger carrying present weaknesses into new methods.

Fewer compromised accounts imply fewer incidents, much less time spent on remediation, and fewer disruption to day-to-day operations.

Beat the price of repeated credential incidents

Sturdy password controls will assist scale back danger. However the true operational payoff lies in decreasing the time and assets spent resolving a continuing circulate of incidents throughout the group.

When you consider fewer lockouts, fewer reset requests, and fewer time spent coping with compromised credentials, you’ll see the impression in decreased day-to-day disruption for each IT groups and finish customers.

If recurring credential incidents have gotten all too frequent in your setting, it’s price taking a more in-depth look.

Need to see how Specops may help strengthen your identification safety? E book a demo to see our options in motion.

Discovered this text fascinating? This text is a contributed piece from one in every of our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.



Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the newest breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s developments right this moment: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech group at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

http://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html

April 7, 2026

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Home windows by way of UAC Bypass

April 6, 2026

LatAm’s Self-Taught Cyber Expertise Ignored Amid Cyberattack Glut

April 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Useful resource-constrained picture technology and visible understanding: an interview with Aniket Roy

By NextTechApril 7, 2026

Within the newest in our sequence of interviews assembly the AAAI/SIGAI Doctoral Consortium members, we…

Tech and Science Sure for Low Earth Orbit

April 7, 2026

Media King picks Nigeria as first cease in Africa’s public WiFi push

April 7, 2026
Top Trending

Useful resource-constrained picture technology and visible understanding: an interview with Aniket Roy

By NextTechApril 7, 2026

Within the newest in our sequence of interviews assembly the AAAI/SIGAI Doctoral…

Tech and Science Sure for Low Earth Orbit

By NextTechApril 7, 2026

Expertise and science demonstrations, supported by numerous NASA business collaborations and company…

Media King picks Nigeria as first cease in Africa’s public WiFi push

By NextTechApril 7, 2026

Media King Group, a Croatian sensible public WiFi supplier, is setting its…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!