Identity Management Day: Sophos Warns on Data Breach Risks

Today, on Identity Management Day, 8th April 2025, Sophos warns businesses about the growing risks of identity theft. A staggering 79% of data breaches are linked to identity theft, costing organizations an average of $4.5 million, according to the Identity Defined Security Alliance [IDSA] and the Ponemon Institute.

The latest Sophos Active Adversary Report shows that cyberattacks are moving faster than ever. On average, attackers steal data just 72.98 hours after an attack starts, and companies typically detect the breach only 2.7 hours later. The longer a stolen identity remains active, the greater the risk of damage.

To combat this, Sophos urges businesses to adopt smart identity management practices. Once a hacker gains access through a compromised identity, they can steal data, access sensitive systems, and escalate attacks. Quick action is essential to limit the damage, and automation is key to responding in real-time.

Identity Management Day
Five Automated Actions to Stop Identity Theft:
Disable the User

As soon as a breach is detected, disable the compromised account. Automation tools can detect suspicious activity and immediately block the attacker from accessing systems.

Force Password Reset

Resetting passwords cuts off access using stolen credentials. Automated systems can trigger resets instantly when a breach is detected, reducing delays and preventing further misuse.

Reset Multi-Factor Authentication [MFA]

MFA provides an extra layer of security. After a breach, it’s crucial to reset MFA to invalidate stolen tokens. Automation ensures rapid token refresh, requiring re-authentication and locking out attackers.

Lock the Account

Temporarily locking a user account prevents further attacks while the incident is investigated. Automated tools help enforce this immediately, buying time to respond effectively.

Revoke Active Sessions

Even if a system disables credentials, attackers may still access active sessions. Revoking these sessions logs them out across all systems.

Real-time automation makes this step fast and effective.

By combining these automated actions, businesses can significantly reduce the impact of identity-related breaches. Taking proactive steps to manage digital identities is no longer optional—it’s essential.

Learn more here: 5 Critical Response Actions for an Identity Breach.

Related Posts

EdTech Drives Education Change

Education has experienced a fundamental transformation because EdTech, along with growing numbers of online learning platforms, have developed…
Total
0
Share