{"id":34833,"date":"2020-05-07T00:31:05","date_gmt":"2020-05-07T00:31:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/"},"modified":"2020-05-07T00:31:05","modified_gmt":"2020-05-07T00:31:05","slug":"so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/","title":{"rendered":"So you&#8217;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/08\/22\/oldwizard.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>About a third of firms and organisations in Europe and the Middle East still believe the humble password is a good enough security measure, according to a survey carried out by French firm Thales.<\/p>\n<p>Moreover, two-thirds of the 400 IT professionals quizzed indicated &#8220;that their organisations plan to expand use of usernames and passwords in the future&#8221;.<\/p>\n<p>The findings come as a contrast to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/05\/05\/logmein_password_survey\/\" rel=\"noopener noreferrer\">yesterday&#8217;s survey<\/a>, which showed that the majority of people (as opposed to companies) don&#8217;t really care about good password hygiene and cheerfully reuse the same one everywhere they digitally go.<\/p>\n<p>Thales, which <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/12\/18\/gemalto_acquired_by_thales\/\" rel=\"noopener noreferrer\">bought secure mobile phone SIM card biz Gemalto in 2017<\/a>, reckoned that over half (57 per cent) of IT pros it polled said that unsecured infrastructure was the most likely attack surface. With that in mind, password-protecting that sort of infrastructure makes more sense than simply leaving it open for any curious or malicious bod to poke around within.<\/p>\n<p>Francois Lasnier, veep of access management solutions at Thales, opined: &#8220;Often, in an effort to adapt to the new working habits of users connecting from anywhere, which is increasingly pertinent right now and will become standard moving forward, businesses tend to revert back to old password-based logins for cloud services in despair. This is knowingly increasing their security exposure to credential stuffing and phishing attacks.&#8221;<\/p>\n<p>Thales, which, among other things, sells access management software, reckoned that its 400 respondents said the amount of staff training on security and access management, increasing spend on access management, and access management becoming a board priority &#8220;have all seen an increased focus&#8221;.<\/p>\n<p>Last year French-owned Thales <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/02\/22\/thales_sells_ncipher_for_gemalto_buyout\/\" rel=\"noopener noreferrer\">flogged off hardware security module biz nCipher<\/a> following its Gemalto acquisition, a sale demanded by competition regulators.<\/p>\n<p>Password security is an ongoing bugbear for security folk. NordVPN found <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/02\/05\/one_direction_is_a_rubbish_band_and_password\/\" rel=\"noopener noreferrer\">in a survey earlier this year<\/a> that tens of thousands across the world were using such Fort Knox-style gems as &#8220;pakistan&#8221;, &#8220;onedirection&#8221; and &#8220;superman&#8221;. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1925\/-8451\/build-the-next-generation-of-your-business-in-the-public-cloud?td=wptl1925\">Webcast: Build the next generation of your business in the public cloud<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/05\/07\/thales_password_survey\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OK, a third agreed with Thales when it asked the question About a third of firms and organisations in Europe and the Middle East still believe the humble password is a good enough security measure, according to a survey carried out by French firm Thales.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34834,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>So you&#039;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"So you&#039;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-07T00:31:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"So you&#8217;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough\",\"datePublished\":\"2020-05-07T00:31:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/\"},\"wordCount\":353,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/\",\"name\":\"So you've set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg\",\"datePublished\":\"2020-05-07T00:31:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"So you&#8217;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"So you've set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/","og_locale":"en_US","og_type":"article","og_title":"So you've set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-07T00:31:05+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"So you&#8217;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough","datePublished":"2020-05-07T00:31:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/"},"wordCount":353,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/","url":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/","name":"So you've set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg","datePublished":"2020-05-07T00:31:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/so-youve-set-up-mfa-and-solved-the-elvish-riddle-but-some-still-think-passwords-alone-are-secure-enough\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"So you&#8217;ve set up MFA and solved the Elvish riddle, but some still think passwords alone are secure enough"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34833"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34833\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34834"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}