Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: Zero Trust ArchitectureZero Trust Securityzero trustCybercrimeManaged Security Servicessecuritycyber threatsData ProtectionRansomware
Author: Scott Gray
Date: February 26, 2024

Did you leave your front door open? Why cyberattacks surge using valid credentials

Have you ever been locked out of the house?

Maybe you forgot your keys on the kitchen table, lost them running errands, or unknowingly dropped them while attempting the It doesn’t matter how you got locked out, or how you got back in. What’s more important, for the purposes of this thought exercise, at least, is how you responded.

Try to remember. What did you do in those initial moments of desperation? Chances are you didn’t immediately Google “locksmiths near me.” Maybe you were eventually left with no other choice. But if you’re anything like me, before calling for professional help, you, first, examined every reachable window and door, hoping at least one had been left unlocked or open. If that didn’t work, perhaps you then also checked under every potted plant, rock, and car wheel well for a spare key your spouse or roommate may have hidden? Am I getting warmer?

The point is, it’s a lot easier to gain access to your home by way of an unlocked patio door or spare key than it would be by breaking a window, paying a locksmith, or seeing an open second-floor bathroom window and thinking, “I bet if I had a ladder, I could squeeze through that tiny window and get back into my house!”

Cybercriminals are no different. Sometimes the path of least resistance is an easily acquired login credential from an unknowing employee. As cybercriminals continue to evolve their tactics, these phishing attacks have become more sophisticated and harder to detect, especially with the latest AI technology.

 

“71% Year-over-year increase in cyberattacks that used stolen or compromised credentials.”

– IBM X-Force Threat Intelligence Index 2024

 

IBM’s latest X-Force Threat Intelligence Index for 2024 sheds light on a concerning trend: the increasing exploitation of valid user accounts to infiltrate corporate networks. This report, based on an extensive analysis of over 150 billion security events daily across more than 130 countries, underscores the growing threat posed by compromised credentials.

In fact, threat actors’ preferred method of accessing a network is no longer hacking. Instead of squeezing through a second-floor window, they would much rather walk right through the front door with valid credentials, likely acquired with malware or phishing attacks.

Martin Borrett, technical director at IBM Security UK and Ireland, highlights that cybercriminals are weaponizing identity, leveraging legitimate accounts to compromise enterprise systems. The data reveals that 50% of cyberattacks in the UK involve the exploitation of valid accounts as the initial attack vector, demonstrating the effectiveness of this approach in breaching business defenses.

According to a recent article in Telecom Tech News, the rise in attacks utilizing valid accounts poses significant challenges for enterprises, with attackers increasingly targeting critical infrastructure organizations globally. In the same article Julian David, CEO of techUK, termed the report a “stark wake-up call,” emphasizing the urgent need for businesses to adopt strategic measures to fortify their defenses against this sophisticated threat landscape.

For example, organizations should evaluate and reinforce their legacy applications wherever possible, while also implementing modern security protocols, such as unified Identity and Access Management solutions. Experts believe taking such steps will be crucial to mitigating risks and enhancing cybersecurity posture as threats continue to evolve.

Zero Trust Security, which we covered in two posts on the blog earlier this month, is another important strategy that can help organizations overcome the rise in cyber threats and the challenges posed by the modern technology environment.

According to Brandon Leiker, solutions architect at 11:11 Systems: “The primary concept of Zero Trust is that users and devices should not be trusted implicitly, even if they are connected to a private internal network controlled by the organization. Instead, access is based on the principle of ‘never trust, always verify,’ where identity and permissions are continuously re-verified.”

In his post, Justin Giardina, CTO at 11:11 Systems, went on to say that: “Zero Trust operates on the assumption that threats can lurk anywhere (even within your organization). Therefore, every user, device, and network flow is treated as potentially compromised and must be verified and vetted before granting access.”

So, the next time you lock yourself out of the house, take a moment to see how easy it is (or isn’t) to get back. Were you eventually able to walk in the front door without much trouble? Then realize that nefarious actors are actively looking to gain access to corporate networks around the globe in much the same way — and your organization could be their next, or even current, target. And making matters worse, their methods, like phishing attacks, have never been harder to detect thanks to the rise of AI and other modern technologies.

That is why implementing a Zero Trust architecture as part of a multi-layered cybersecurity strategy is paramount — to keeping pace with these evolving threats and keeping bad actors out. To learn more about how to protect your organization with Zero Trust, take a look at these additional 11:11 resources and tools:

    • Webinar – Securing Cloud with Zero Trust
    • White paper – Never Trust, Always Verify
    • Blog Posts – What is Zero Trust Security and Why Do I Need it? and Navigating the complex world of zero trust security
    • Product Page – 11:11 Systems Managed Security Services

 

Categories: Cybercrime, Ransomware, Security, UncategorizedBy Scott GrayFebruary 26, 2024
Tags: Zero Trust ArchitectureZero Trust Securityzero trustCybercrimeManaged Security Servicessecuritycyber threatsData ProtectionRansomware

Author: Scott Gray

Scott Gray is a Product Marketing Manager at 11:11 Systems focused on managed security where he helps create product messaging and communications. As a "product guy" at heart, Scott has over 30 years of experience working in the IT and Consumer Electronics industries. Before joining 11:11 Systems Scott held roles at Compaq, Dell, HP, Panasonic, and Sharp in a variety of product management and product marketing roles. Scott graduated with a master's degree in International Business from Roosevelt University and also holds an undergraduate degree in Marketing from Oklahoma State University. Scott enjoys spending time with his family and is an avid sports fan.

Post navigation

PreviousPrevious post:What is Zero Trust Security and Why do I Need it?NextNext post:Making Sense of the SEC’s New Rules for Cybersecurity Risk and Disclosure (Part I)

Related Posts

Better Network Visibility with New 11:11 Cloud Console Tools
August 21, 2025
Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
vulnerability management
A Modern Approach to Managing Vulnerabilities
May 30, 2025
Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
ransomware attack, worst day
The Remedy Against Ransomware: Insights from Our April 2025 Webinar
May 19, 2025
Cyber Resilience
Reimagining Cyber Resilience in the Gambling Industry: A Strategic Imperative for the Digital Age
May 13, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top