Enterprise Password Management

Almost 81% of hacking-related data breaches involve either a weak or stolen employee password. How an organization manages and protects credentials is critical to cybersecurity, which is why a growing number of companies are investing time and funds into enterprise password management.

This article is a complete guide to enterprise password management (EPM). We explain the basics of EPM, present go-to strategies and best practices, plus offer detailed reviews of the 12 best EPM tools currently available on the market.

Enterprise password management explained

Our guide to strong passwords explains how to create credentials that are easy to remember and impossible to crack. You can also use PNAP's Password Generator to create a unique password instantly.

What Is Enterprise Password Management (EPM)?

Enterprise Password Management (EPM) is a set of policies and tools organizations use to manage, protect, and control access to authentication credentials. EPM enables companies to:

The goal of EPM is to keep passwords safe without overly inconveniencing the workforce. An EPM tool must ensure security, but also provide a simple way to create, store, and access passwords.

The core feature of all EPM tools is so-called password vaulting. Each employee gets a personalized virtual "locker" for storing credentials. Users access the vault with a master key, which is the only password employees must remember. Once you log into the vault, the tool provides access to all other credentials.

Here's a list of other common features you should expect from an average EPM tool:

In addition to improving the security posture, enterprise password management also helps meet compliance requirements. Many industry and regulatory standards (PCI-DSS, HIPAA, GDPR, etc.) insist on tight control over user and employee credentials.

Why Is Enterprise Password Management Important?

Here's why implementing enterprise password management should be at the top of a company's to-do list:

Recent studies reveal that between 20% and 50% of all help desk calls are for password resets (a process that takes 2-30 minutes to complete depending on what went wrong and general tech-savviness). TheĀ average cost of each reset is $70, so EPM tools also reduces day-to-day costs for your organization.

Concerning enterprise password managment stats

Enterprise Password Management Best Practices

Here's a list of the best practices for managing, storing, and protecting passwords (with or without an EPM tool):

Check out our article on security awareness training to get tips on making your sessions as streamlined and effective as possible.

12 Best Enterprise Password Management Solutions

Below is an in-depth look at the best enterprise password management tools currently on the market. We reviewed both free and paid platforms, so you'll find the right fit regardless of your budget.

Free Enterprise Password Management Solutions

Let's first check out the best EPM tools that offer enough "freemium" features to significantly improve password management and security at your organization. 

KeePass logo

KeePass

KeePass is an open-source password management tool that relies on AES 256-bit encryption with plugins that support additional algorithms (GOST, Twofish, ChaCha20, and Serpent).

Despite being completely free, KeePass is rich in features. Here's an overview of what the tool offers:

KeePass also enables you to write custom plug-ins (or download plug-ins from other users) to extend the tool's functionality.

Compatibility: Windows, macOS, and Linux (there are unofficial editions for Android, iOS, and all major browsers).

Who should use it: Companies on the market for a free EPM tool and with teams experienced in open-source coding.

Main pros of KeePass

Main cons of KeePass

Bitwarden logo

Bitwarden

Bitwarden is an open-source password manager that uses AES-CBC 256-bit encryption for vaults and PBKDF2 SHA-256 for encryption keys. Unlike KeePass, Bitwarden has both a free and paid edition.

The main trait behind Bitwarden's security is that the tool does not store your passwords. Instead, the platform keeps encrypted versions of passwords, and users are the only ones with the decryption key.

Bitwarden's free tier is limited compared to the paid version of the tool, but the free edition offers a well-rounded set of features:

Bitwarden's Teams edition costs $3/month per user and the Enterprise tier charges $5/month per user. Premium versions of the tool provide extra features, such as 2FA via YubiKey and FIDO2, priority support, custom management roles, and single sign-on (SSO).

Compatibility: Windows, macOS, Linux, Android, and iOS (plus extensions for Chrome, Firefox, Safari, Edge, Opera, Vivaldi, Brave, DuckDuck Go, and Tor).

Who should use it: Smaller, tech-savvy teams looking for a free or low-cost EPM tool.

Main pros of Bitwarden

Main cons of Bitwarden

Norton logo

Norton Password Manager

Norton Password Manager is one of the most streamlined free password managers on the market. The tool provides users with:

Norton also offers a free password generator that helps quickly and easily create hard-to-crack credentials.

Compatibility: Android and iOS (plus extensions for Chrome, Firefox, Safari, and Edge).

Who should use it: Sole proprietors and small businesses looking for a free and easy-to-use password manager.

Main pros of Norton Password Manager

Main cons of Norton Password Manager

Dashlane logo

Dashlane

Dashlane is a password manager that has both free and paid editions. The main selling point of this tool is its high levels of safety as Dashlane uses the following measures to keep vaults safe:

The free version of Dashlane offers the following features:

Paid versions of Dashlane (which start at $4.99/month per user) include extra features, such as:

High levels of security and a built-in VPN make Dashlane a sound choice for companies with remote-first workforces.

Compatibility: Windows, MacOS, iOS, and Android (plus extensions for Edge, Chrome, Firefox, and Safari).

Who should use it: Companies that rely on remote teams and are worried about login security.

Main pros of Dashlane

Main cons of Dashlane

Learn about shadow IT and see why the use of unsanctioned devices is a common cause of password-related incidents.

Paid Enterprise Password Management Solutions

Let's now explore the market's top paid enterprise password management tools that offer the most value for your money.

1Password logo

1Password

1Password is a popular password manager with a range of excellent EPM features, such as:

This EPM tool has a detailed knowledge base that helps users set up and use the tool. 1Password also integrates with Have I Been Pwned to monitor for data breaches.

1Password Business tier pricing is $7.99/month per user, but there's also the Team Starter Pack option that costs $19.95/month for up to 10 users. The tool has a 14-day free trial for all plans.

Compatibility: Windows, macOS, Linux, Android, and iOS (plus extensions for Chrome, Firefox, Edge, Brave, and Safari).

Who should use it: SMBs that want granular password controls and in-depth monitoring.

Main pros of 1Password

Main cons of 1Password

NordPass logo

NordPass

NordPass is an excellent tool that encodes all sensitive data with the xChaCha20 encryption protocol. Other security-related capabilities offered by the tool include:

Additionally, NordPass keeps user activity logs that enable an organization to track password usage and overall health. You also get cross-platform support, auto-fill capabilities, and the ability to store different types of credentials.

NordPass Business tier pricing starts from $3.59/month per employee (up to 250 users). The Enterprise edition allows more than 250 users, plus has SSO with Azure AD, MS ADFS, and Okta. Both tiers have trial periods.

Compatibility: Windows, macOS, Linux, iOS, and Android (plus extensions for Chrome, Firefox, Edge, and Opera).

Who should use it: Organizations chiefly worried about data security compliance rules (e.g., healthcare providers or companies operating in the E.U.).

Main pros of NordPass

Main cons of NordPass

LastPass logo

LastPass

LastPass is a password manager that uses AES 256-bit encryption and operates under a zero-knowledge policy. The tool is also SOC2, SOC3, C5, ISO27001, and GDPR compliant.

LastPass's main selling point is its ease of use. The tool is very simple and convenient for employees as it enables them to easily:

LastPass also emphasizes proactive security with features such as:

LastPass has two tiers: the Teams edition (which costs $4.25/month per user) and the Business edition (which charges $6.25/month per user). The Teams tier limits you to under 50 users, while the Business version has no user cap. Both tiers have a trial period.

Compatibility: Windows, macOS, Linux, iOS, and Android (plus extensions for Chrome, Firefox, Safari, Edge, and Opera).

Who should use it: Teams looking for an easy-to-use password manager with well-rounded features.

Main pros of LastPass

Main cons of LastPass

Zoho Vault logo

Zoho Vault

Zoho Vault is an affordable password manager that comes in several editions. Even the free version is okay for individual users, but the Team tier (which charges $0.90/month per user) has solid EPM features, including:

The more feature-rich Enterprise edition charges a minimum of $4.50/month per user and adds additional capabilities, such as:

Zoho also offers a range of other business apps (such as CRM and sales software), all of which integrate seamlessly with Zoho Vault.

Compatibility: Windows, macOS, Linux, iOS, and Android (plus extensions for Chrome, Firefox, Safari, Edge, Brave, and Vivaldi).

Who should use it: Companies on the market for feature-rich and affordable EPM services.

Main pros of Zoho Vault

Main cons of Zoho Vault

Passbolt logo

Passbolt

Passbolt is an open-source password manager known for its flexibility and customization. The tool's Community tier is free to use for an unlimited number of users and has the following features:

The Business tier (which costs $3/month per user) adds the following features:

Finally, the Enterprise tier (which has custom prices) offers additional features you won't find in many other EPM tools, such as:

Passbolt enables users to choose whether to self-host the tool on their servers or use the platform's cloud services.

Compatibility: The team behind Passbolt recommends you run the tool on a stable version of a major Linux distribution, such as Debian or Ubuntu. There are browser extensions for Edge, Chrome, and Firefox.

Who should use it: Organizations with teams experienced in open-source tools and looking to host an EPM on an in-house server.

Main pros of Passbolt

Main cons of Passbolt

Keeper logo

Keeper

Keeper is a password management tool that offers top-tier security and EPM services. The tool is highly secure thanks to a zero-trust and zero-knowledge architecture.

Keeper has three paid tiers, all of which allow an unlimited number of devices. The Starter plan (which costs $2.00/month per user) offers:

The Business tier (which costs $3.75/month per user) adds delegated administration, share admins, and advanced organizational structure. Finally, the Enterprise edition (which has custom prices) adds advanced features like:

All tiers have access to a helpful password generator that enables users to quickly create strong and unique credentials.

Compatibility: Windows, macOS, Linux, iOS, and Android (plus extensions for Chrome, Firefox, Brave, Safari, Edge, and Opera).

Who should use it: Sizable companies looking for advanced EPM services and good per-user prices.

Main pros of Keeper

Main cons of Keeper

Roboform logo

Roboform

RoboForm is an excellent password manager that excels at enforcing EPM rules at larger companies thanks to:

This EPM tool enables users to store various data in their vaults (passwords, usernames, bookmarks, business-related files, etc.). All stored data is easily sharable across teams.

Teams with 1 to 10 members will have to pay $39.95/year per user for RoboForm. The tool does have 3-year and 5-year subscription options that bring the per-user price down, plus larger teams get significant discounts.

Compatibility: Windows, macOS, iOS, and Android (plus extensions for Chrome, Firefox, Safari, Edge, and Opera).

Who should use it: Bigger companies looking for top-tier EPM for large teams spread across multiple departments.

Main pros of Roboform

Main cons of Roboform

Sticky Password logo

Sticky Password

Sticky Passwords is a cost-friendly password manager with a solid offering that includes:

One of Sticky Password's main selling points is that the tool guarantees clients never permanently lose employees' credentials. In case of an incident or a disgruntled employee, there's an Emergency Access feature that allows admins to gain access to a specific account.

Sticky Password charges clients $29.99/year per user. The tool has a free edition, but that version of Sticky Password does not allow syncing or password sharing. There is also the premium version that charges $39.99/year per user and adds syncing across devices and dark web monitoring.

Compatibility: Windows, macOS, iOS, and Android (plus extensions for Chrome, Firefox, Safari, Edge, Opera, and Brave).

Who should use it: Less tech-savvy teams with many shared machines that wish to ensure there's no way to permanently lose credentials.

Main pros of Sticky Passwords

Main cons of Sticky Passwords

Challenges of enterprise password management

Which Enterprise Password Management Solution Should You Choose?

The first decision you must make is whether you'll use a free or paid enterprise password management tool. Most platforms keep advanced features behind a "paywall," but basic features are enough for some companies and use cases.

If you opt for a paid EPM tool, remember to both consider the initial purchase and ongoing maintenance costs. Other factors you must account for when choosing a tool are:

Consider these factors and go with one of the enterprise password management tools discussed above. Every tool we covered here is a worthwhile choice, but some fit certain use cases better than others.

We also recommend you test the tool before going all-in on a paid edition. All the platforms discussed above have some form of trial, so there's no harm in giving several tools a go and seeing which one performs the best before choosing a long-term solution.

Free or Paid, an EPM Tool is a Must

Manual management of your company's passwords is too complex, time-consuming, and outright risky. Even a single password falling into the wrong hands is enough to cause a data leakage or breach, so invest in EPM and ensure your credentials are safe from prying eyes.

Ransomware in Healthcare: Stats and Recommendations

In 2022, healthcare organizations across the world collectively suffered an average of 1.463 cyberattacks per week (up 74% from 2021). Of all these incidents, ransomware is by far the most devastating, both in terms of finances and patient safety.

This article goes through everything you need to know about ransomware attacks targeting healthcare providers. We analyze the most recent statistics, explain exactly why so many criminals go after hospitals, and present the best ways for healthcare organizations to protect themselves against ransomware attacks.

Ransomware in healthcare

Ransomware attacks are constantly becoming more varied, so learning about different types of ransomware is a must for any security team hoping to stay a step ahead of cybercriminals.

Healthcare Ransomware Statistics

The statistics below highlight the seriousness of the ransomware threat in the healthcare industry:

Criminals stole data in 17 out of 24 confirmed ransomware attacks on US-based healthcare organizations in 2022. Stealing data before encrypting files enables hackers to pressure victims with the threat of data leakage (either by selling the data to the highest bidder or posting it online).

Why Are Hospitals a Target for Ransomware?

Here's why hospitals are among the most common targets for ransomware attacks:

Learn how to prevent social engineering attacks and ensure criminals cannot easily trick your staff into sharing valuable info or installing malicious software.

How to Prevent Ransomware Attacks in Healthcare

While you can't prevent criminals from attempting attacks, organizations can improve their ransomware resilience in numerous ways. Let's see the most effective methods healthcare providers use to lower the likelihood of successful ransomware attacks.

Ransomware protection in healthcare

No matter what industry you do business in, PNAP's ransomware protection will significantly boost your security posture against this cyber threat. Keep your files safe with a mix of cutting-edge cloud solutions, disaster recovery, and immutable data backups.

Build Employee Awareness

Hospital staff is the first and the most vulnerable line of defense against ransomware attacks. Provide regular and mandatory security awareness training to all employees to ensure everyone understands their role in preventing ransomware. All team members must know how to:

Hospital staff members have different roles and responsibilities, so employees have different levels of exposure to threats. Account for those differences during threat modeling and tailor the training program to specific positions.

Boost Overall Cybersecurity

High levels of cybersecurity help a hospital detect and contain threats before they escalate. Most ransomware attacks take days or even weeks to execute after the initial infection, so your team has ample opportunities to detect suspicious activity before malicious software reaches data.

A healthcare provider should focus on improving:

Continue learning about cybersecurity best practices and see what else a team can do to boost hospital security.

Segment Your Networks

Segment networks into multiple subnetworks to prevent lateral movement and build a "wall" around critical systems and files. That way, even if ransomware strikes, you minimize the so-called blast radius and contain the threat within a particular network segment.

Each subnetwork should have separate security controls, access policies, and firewalls. These precautions make it difficult for hackers and malicious software to break into each segment, giving the security staff more time and opportunities to recognize and isolate the threat.

Ransomware attacks on hospitals

Perform Regular Data Backups

Up-to-date data backups do not prevent ransomware attacks, but they ensure the hospital:

Ensure the hospital regularly backs up all valuable data. Back up files multiple times a day and use at least two backups (keep one instance offline). Ensure the team also tests backups regularly to ensure there's no accidental data corruption.

As an extra precaution, consider using immutable backups. This type of backup prevents any form of editing (including encryption), so hackers cannot scramble files even if they reach the backup storage.

Learn how to create an effective data backup strategy that ensures you never permanently lose valuable files no matter what goes wrong.

Have a Go-To Incident Response Plan

You require a comprehensive incident response plan in case a hacker manages to break through your cyber defenses. Here's a rough outline of a step-by-step anti-ransomware plan:

The more in-depth your disaster recovery plan goes, the better you'll handle the actual attack. Just remember that the response team requires clear go-to steps to respond to a threat quickly, so also prepare a shorter version of the plan staff members will use in times of crisis.

Once you have a plan in place, it's time to test it for flaws. Occasionally run penetration tests to simulate real-life attempts to inject ransomware and see how your team responds to realistic attack simulations.

Perform Regular Vulnerability Assessments

Vulnerability assessments check your systems, devices, and staff for exploitable weaknesses. These types of tests inspect the hospital for flaws that could lead to ransomware attacks, including:

Regular scans for vulnerabilities help ensure every staff member is on their toes in terms of security and that the IT (both hardware and software) is as ready for ransomware attacks as possible.

Learn more about ransomware prevention and get further tips on how to protect your business from this cyber threat.

Why you should not pay the ransom in case of an ransomware attack

Ransomware Attacks on Healthcare Providers Aren’t Going Anywhere

If you work at a healthcare organization, it's only a matter of time before you'll have to deal with a ransomware attack. Whether the attempt ends up being successful is primarily up to your readiness level, so counter the threat of ransomware with a mix of employee training and a robust cybersecurity strategy.

What Is Shadow IT?

While relatively harmless at first sight, shadow IT causes major risks for companies. In 2022, nearly 7 out of 10 organizations experienced a security incident due to employees using unsanctioned hardware or software.

In addition to security concerns, shadow IT is also among the leading causes of app sprawl, operational inefficiencies, and compliance violations.

This article explains the dangers of shadow IT and its potentially devastating effects on security postures and bottom lines. We'll take you through all you need to know about this widespread problem and present the most effective ways of keeping shadow IT at a minimum.

Shadow IT explained

What Is Shadow IT?

Shadow IT refers to any unauthorized device, IT service, or app employees use without the knowledge of the company's security department. When the security team is unaware of a certain application or piece of hardware, the organization cannot support the tech or ensure that it's secure.

Employees typically turn to shadow IT because of convenience or when an app offers better functionality than what the company approved for using. While convenient for employees, shadow IT poses several considerable risks for an organization, including:

Here are a few statistics that show just how prevalent shadow IT is:

There are a few reasons why shadow IT got out of control in recent years:

Learn how to implement an effective BYOD policy that keeps business assets safe without overly disrupting your team's day-to-day tasks.

Shadow vs official IT

Examples of Shadow IT

Below are some of the most common examples of shadow IT:

While they take on many forms, all examples of shadow IT introduce the same problem—they create new attack vectors outside the view of the security team.

What Are the Cons of Shadow IT?

The use of shadow IT rarely has malicious intent, but the practice often leads to severe consequences, including:

Any data employees store on shadow IT assets will not be a part of your regular backups, which is an issue you must account for in your corporate backup strategy.

Are There Any Positives to Shadow IT?

While the cons by far outweigh its pros, there are some positives to shadow IT. The most notable benefits are:

Since most companies see shadow IT as an inevitability, many organizations are now trying to control the practice with security protocols. There are some mandatory precautions if you opt for that route, such as:

In the fast-paced business world, giving employees some freedom to solve problems and experiment is advantageous. However, allowing shadow IT to go on uncontrolled is a massive mistake, so let's see how companies keep the practice in check.

Most common causes of shadow IT

How Do You Handle Shadow IT?

Here are the most effective ways of preventing shadow IT:

  1. Create IT policies: Create detailed policies that outline all allowed software, hardware, and services within the organization. Policies must also explain exactly how employees should use authorized tech, as well as state any consequences of violating the rules. 
  2. Provide IT support: Ensure all teams have adequate IT support to address their tech needs and issues.
  3. Encourage communication: Encourage an open dialogue between IT and other departments to ensure all teams are happy with their assigned technologies. Open lines of communication lower the chance of anyone secretly using unauthorized tech.
  4. Educate employees: Organize regular awareness training to educate teams about the risks of shadow IT. Ensure everyone understands why you insist on using only approved software and hardware.
  5. Create a quick (but safe) approval process: If someone in your team proposes adding a new tool to operations, the approval process must be quick and secure.
  6. Conduct regular tool audits: Carry out regular audits that track what tools different departments use to perform their tasks.
  7. Boost endpoint security: Improve your endpoint security to prevent employees from installing unapproved apps on their devices (either company-owned or as a part of the BYOD policy).
  8. Monitor network activity: Your security team must monitor network activity for signs of unauthorized solutions and services. Make full use of intrusion detection systems and firewalls to analyze traffic and user actions.
  9. Regular reviews: Periodically review and update your IT policies, approval processes, and security measures. Ensure you're both up to date with the latest technology trends and security threats.
  10. CASB and ASM tools: Regardless of whether you opt to tolerate some amount of shadow IT or not, the aforementioned CASB and ASM tools are a worthwhile investment.

Since a large portion of shadow IT occurs in the cloud, your cloud security policy is a major part of stopping teams from using rogue services.

Keep Unauthorized Apps and Devices at a Minimum

While shadow IT boosts employee productivity and helps drive innovation, uncontrolled use of technology introduces potentially devastating risks. Keep shadow IT at a minimum by educating employees, setting up effective preventive measures, and encouraging teams to be open about their IT needs.

What Is Rate Limiting?

Rate limiting is a simple yet highly effective technique for protecting APIs from unintentional and malicious overuse. Without a rate limit, anyone can bombard a server with requests and cause spikes in traffic that eat up resources, "starve" other users, and make the service unresponsive.

This article is an intro to rate limiting and the importance of restricting the number of requests that reach APIs and services. We explain what rate limits are and how they work, plus cover the different types of algorithms you can use to adopt rate limiting for your use case.

Rate limiting explained

Almost 95% of companies have had an API-related security incident in 2022. Additionally, approximately 31% (around 5 billion) of all malicious transactions targeted APIs, which should place securing this attack vector at the top of an organization's to-do list.

What Is Rate Limiting?

Rate limiting is the practice of restricting the number of requests users can make to a specific API or service. You place a cap on how often users can repeat an action (i.e., attempting to log into an account or send a message) within a certain time frame. If someone reaches their limit, the server begins rejecting additional requests.

Rate limiting is both a cybersecurity precaution and a key part of software quality assurance (QA). Companies use rate limits to:

Technically, rate limiting is a form of traffic shaping. The practice lets you control the flow and distribution of traffic to prevent infrastructure overload or failure.

Most systems with a rate limit have caps well above what even a high-volume user could realistically request. The most common example is social media messaging. All social media websites have a cap on the number of direct messages you can send to other users. If someone decides to send a thousand messages to other profiles, rate limiting kicks in and stops the user from sending messages for a certain period.

Learn the most effective ways to prevent DDoS attacks and stay a step ahead of would-be hackers trying to overload your server with fake traffic.

Why Is Rate Limiting Important?

Here's a list of the main reasons why rate limiting is an essential aspect of any healthy service:

Our comprehensive article on the different types of cyberattacks takes you through 16 kinds of attacks your team must be ready to face.

How rate limiting works

How Does Rate Limiting Work?

To set a rate limit, an admin places a cap on the number of requests users can make to a server or API within a certain time frame. Typically, the rate-limiting mechanism tracks two key factors:

The main metric for rate limits is the Transactions Per Second (TPS). If a single IP address makes too many requests within a certain period (i.e., goes over its TPS limit), rate limiting stops the server or API from responding. The user gets an error message and is unable to send further requests until the timer resets.Ā 

Rate limiting always relies on some form of throttling mechanism that slows down or blocks requests. Admins implement rate limiting on the server or client side, depending on which strategy better fits the use case:

Many admins also set rate limits based on usernames. This approach prevents brute force attackers from attempting to log in from multiple IP addresses.

Worried about bots brute forcing your usernames and passwords? Here are 8 simple yet highly effective strategies for preventing brute force attacks.

Types of Rate Limits

Let's look at the different types of rate limits you can use to control access to a server or API. Just remember that you can combine different types into a hybrid strategy. For example, you may limit the number of requests based on both IP addresses and certain time intervals.

Types of rate limits

Time-Based Rate Limits

Time-based rate limits operate on pre-defined time intervals. For example, a server may limit requests to a certain number per time period (such as 100 per minute).

Time-based rate limits typically apply to all users. You can set these limits to be either fixed (timers count down regardless of when and if users make requests) or sliding (the countdown starts whenever someone makes the first request).

Geographic Rate Limits

Geographic rate limits restrict the number of requests coming from certain regions. These caps are an excellent choice when running location-based campaigns. Admins get to limit the requests from outside the target audience and increase availability in target regions.

These rate limits are also good at preventing suspicious traffic. For example, you could predict that users in a certain region are less active between 11:00 PM and 8:00 AM. You set a lower rate limit for this time, which further constraints any attacker hoping to cause problems with malicious traffic.

User-Based Rate Limits

User-based rate limits control the number of actions individual users can take in a certain time frame. For example, a server may limit the number of login attempts each user can make to 100 per day.

User-based limits are the most common type of rate limiting. Most systems track the user's IP address or API key (or both). If the user exceeds the set rate limit, the app denies any further requests until the per-user counter resets.

Keep in mind that this type of rate limiting requires the system to maintain the usage statistics of each user. Such setup often leads to operational overhead and increases overall IT costs.

Concurrency Rate Limiting

Concurrency rate limits control the number of parallel sessions the system allows in a certain time frame. For example, an app might prevent more than 1000 sessions within a minute.

Server Rate Limits

Server rate limiting helps admins share a workload among different servers. For example, if you run a distributed architecture with five servers, you could use a rate limit to place a cap on each device.

If one of the servers reaches its cap, the device either routes it to another server or drops the request. Such a strategy is vital to achieving high availability and preventing DoS attacks that target a specific server.

API Endpoint-Based Rate Limiting

These rate limits are based on the specific API endpoints users are trying to access. For example, an admin may limit requests to a specific endpoint to 50 per minute, either due to security or overloading concerns.

Learn about endpoint security and see what it takes to keep devices at the network's edge safe from malicious activity.

Rate Limiting Algorithms

Here are the most common algorithms companies rely on to implement rate limiting:

The main factors to consider when choosing a rate-limiting algorithm are the unique needs of your API and the expected traffic volume. Your method of choice must prevent overload and stop malicious activity but also ensure legitimate users use the service without interruptions.

How To Implement Rate Limiting?

Below is a step-by-step guide to implementing rate limiting (although the exact way you set limits depends on your specific tech stack):

Implementing rate limiting is a simple process for most use cases. For example, if you're using Nginx as a web server and wish to set a rate limit at the server level, you'll use the ngx_http_limit_req_module module. Simply add the following code to the Nginx configuration file to set up rate limits based on the user's IP address:

http {
    limit_req_zone $binary_remote_addr zone=one:10m rate=2r/s;
    ...

server {
    ...
    location /promotion/ {
        limit_req zone=one burst=5;
    }
}

The code above allows no more than 2 requests per second on average, while bursts cannot exceed 5 requests.

Rate limiting challenges

A Simple, Yet Highly Effective Defensive Practice

Rate limiting is essential both for the security and quality of your APIs, apps, and websites. Failing to limit the number of requests leaves you open to traffic-based attacks and leads to poor performance (which causes higher bounce rates, problems with customer retention, etc.). Considering how easy it is to implement this precaution, setting a rate limit is a no-brainer decision for most use cases.

Backup Strategy: Ultimate Guide for Data Backup

A data backup strategy, the way organizations back up critical files and restore them in case of an incident, is an integral part of your cybersecurity planning. Without a sound backup strategy, your organization must live with the looming threat of permanent data loss and its all-too-often devastating effects (lost productivity, costly recreation, legal fines, reputation damage, etc.).

This article provides a step-by-step guide to creating well-rounded and cost-effective data backup strategies. Read on to see what you'll have to include in your plan and learn how to ensure critical files are restorable no matter what goes wrong with the original data set.

How to create a data backup strategy

Learn about backup and disaster recovery (BDR), the idea of unifying data backups and disaster recovery into a single practice to create a more comprehensive protection strategy.

Why Is Data Backup Important?

Here's why you should not overlook the value of up-to-date data backups:

Studies show that 2022 was the first year in which cyberattacks overtook human error as the top cause of data loss (just over 38%). Unfortunately, employees did not start making fewer mistakes—instead, cybercrime is at an all-time high, which only further emphasizes the value of regular data backups.

Types of Data Backup

There are three major backup types: full, differential, and incremental backup. Let's look at the main pros and cons of each backup type.

1. Full Backups

A full backup creates a complete replica of every file in the system. This backup type copies the data set in its entirety without considering whether the team changed some files since the last backup.

Pros of full backups:

Cons of full backups:

2. Differential Backups

A differential backup only copies the changes that occurred since the last full backup. That way, admins avoid making redundant backups of every file in the data set.

Here's how a differential backup works in practice:

If something goes wrong with the original database, an admin first restores the full backup and then recovers the latest differential one to get the most recent data.

Pros of differential backups:

Cons of differential backups:

3. Incremental Backups

An incremental backup only copies changes since the last backup of any type (unlike differential backups that only copy changes since the previous full backup).

For example, let's say you take a full backup on Monday. On Tuesday, the team adds a few new files to the data set. An incremental backup on Tuesday only backs up the changes made on Tuesday.

If you make additional changes on Wednesday and take another incremental backup, you'll copy only the changes made on Wednesday and ignore everything that happened before Tuesday's incremental backup.

Pros of incremental backups:

Cons of incremental backups:

Data backups are an essential aspect of endpoint security, the practice of keeping your employees' devices (and whatever's stored on them) safe from threats.

Data Backup Strategy

The first step to creating a backup strategy is determining what data you'll be backing up. Remember that you should not have backups of every piece of data in your organization. Such an approach is both too complex and expensive—instead, focus on mission-critical files such as:

Once you know what data you'll be backing up, it's time to come up with a detailed plan. Below is a step-by-step guide to creating a data backup strategy.

Step 1: Understand the Data You're Backing Up

Gather all data you plan to back up and group files based on their criticality. Break them up into three categories based on how important it is to restore each data set if something goes wrong:

Each group requires a separate backup strategy. Also, any data that does not belong in any of the three categories will do fine with a biweekly or monthly backup. Perform a risk assessment and business impact analysis to help your team classify data:

Next, evaluate where you store each data set and how frequently it changes. This analysis gives you a deeper understanding of where and how your data lives. Finally, define RTOs and RPOs for your data:

Our RTO vs. RPO article breaks down the differences between the two metrics and explains their roles in disaster recovery strategies.

Step 2: Determine Backup Frequency and Type

Once you understand the criticality of each data set, it's time to decide how often you need to back up files. The frequency at which you should back up data depends on several factors:

RPOs and RTOs are huge factors when deciding backup frequency:

Then, choose your preferred backup type. You have three options to choose from:

Keep in mind the pros and cons of each backup type we discussed earlier. While full backups are the most reliable option, they are also more time-consuming and storage-hungry than other backups.

One of the most common schedules is running a full backup every other week and performing incremental backups every day in between.

Most common storage for data backups

Step 3: Determine Storage Location

Next, decide where you want to store backups. You can use on-site storage (such as an external hard drive, USBs, tapes, or a dedicated storage server) or off-site cloud backup repositories.

Store your backups in the cloud! Veeam Cloud Connect Backup and Replication is now available on a 7-day FREE trial! Start your trial today and safely store your backups to global locations in the U.S., Europe, and Asia.


Here are some factors to consider when deciding whether to keep backups on-prem or in the cloud:

You'll also have to decide how long you want to keep backups. The retention rate depends on the criticality of data, how frequently you make new backups, and whether files fall under some industry-specific regulation.

Step 4: Establish (and Document) Backup Procedures

Once you know the basics of your data backup strategy, it's time to document them. Documentation should serve as a single source of truth for anything backup-related and a training guide for in-house teams. Document the following information:

Once you define a data backup strategy and create the first replica, perform a full restore to a test environment to verify everything works as intended. Check whether there're any signs of missing or corrupt files—your team should perform this precautionary checkup at least once a month.

Remember that your data backup strategy is not set in stone. What works great today may not work as well tomorrow, so review your plan periodically to ensure backups stay effective and in line with business objectives.

Common data backup mistakes

What Is a 3-2-1 Backup Strategy and Is It Good?

The 3-2-1 backup strategy is a popular method for backing up data. The strategy requires you to create three copies of data, store two versions on different media, and keep one copy off-site (hence the 3-2-1 name). Here's a breakdown of how this strategy works:

The 3-2-1 backup strategy is a sound option for organizations of all sizes. This approach to backing up data offers the following benefits:

While the 3-2-1 backup strategy is effective, there are a few downsides to this system that you should keep in mind:

Check out our backup and restore services to see how we help companies create recovery strategies as effective as any 3-2-1 system yet significantly less complex to manage.

Don't Take Unnecessary Risks With Critical Data

Being caught off guard by a dangerous event such as ransomware or an insider threat without a working data backup is a recipe for disaster. Recreating lost data is expensive and time-consuming (not to mention even impossible in some cases). Instead of risking such scenarios, take the time to plan and implement an effective backup strategy that minimizes the chance of data loss no matter what goes wrong at your company.

What is Endpoint Security

Every endpoint (PC, laptop, smartphone, etc.) that connects to a network is a potential entry point for a hacker. These devices are typically the first attack vector criminals test when trying to hack into a system. If an endpoint turns out to be vulnerable, the intruder breaks into an otherwise secure network without having to "crack" its primary cyber defenses.

This article is an intro to endpoint security that explains how companies protect what many describe as the weakest link in network security. Read on to learn what it takes to keep would-be hackers out of endpoints and ensure these devices do not become a doorway to your assets and data.

Endpoint security

Endpoint protection is a subset of the broader network infrastructure security, an area of cybersecurity that focuses on protecting the network's underlying hardware and software.

What is Endpoint Security?

Endpoint security (or endpoint protection) is the practice of keeping endpoint devices safe from external and insider threats. The primary goals of endpoint security are to:

Any device or system that communicates with the network from outside its firewall is an endpoint. Nowadays, this definition extends far beyond the PCs we use for work — here's a list of all the endpoints modern organizations must secure and account for:

The number of internet-enabled devices is at an all-time high, so companies have their hands full when preparing for attacks. Here are some of the most common endpoint security risks a team is likely to face:

These risks are only the tip of the iceberg. Check out our article on the different types of cyberattacks to get an in-depth breakdown of the current cybercrime landscape.

Why is Endpoint Security Important?

Any device with access to a network is a potential target for an attack, but some devices are easier to hack than others. For example, a personal phone connected to the office Wi-Fi is significantly less challenging to crack than the main server. While there's less to gain from hacking an endpoint, the phone is still a worthwhile objective as it likely has access to some business data.

Sometimes, going after data accessible to a specific endpoint is not the primary goal of an attack. More skilled hackers know how to compromise an endpoint and then use the device for lateral movement to reach valuable databases or set up an APT threat.

A recent study reveals that almost 70% of successful data breaches originate at an endpoint device. Here are a few other figures that show the criticality of keeping endpoints safe:

Security concerns aside, high levels of endpoint protection are often a prerequisite for meeting compliance. Many industries and regions require a business to keep endpoints safe to comply with regulations (especially if devices have access to sensitive user data).

Read about the business world's most common (and strictest) regulations and see what it takes to ensure compliance:

You can also check out our CCPA vs GDPR article for a detailed comparison of the two most prominent data privacy regulations.

What Are the Types of Endpoint Security?

There are three main types of endpoint security: Endpoint Protection Platforms (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR).

Endpoint Protection Platform (EPP)

EPPs primarily focus on preventing malware and are comparable to what you'd expect from a reactive antivirus program. These platforms help deal with threats by:

Admins deploy an EPP directly on endpoints, but there's always a central platform that analyzes data (either on-prem or in the cloud).

Endpoint Detection and Response (EDR)

An EDR offers the same features as EPPs but also has the capability to respond to active threats in real-time. These platforms enable an admin to:

EDRs detect various threats that are invisible to an EPP, such as file-less malware or polymorphic attacks.

Extended Detection and Response (XDR)

An XDR platform offers better protection and deeper risk analysis than an EDR. XDRs provide more visibility and rely heavily on automation to correlate and eliminate threats.

An XDR tool crosses multiple security layers (endpoints, network traffic, etc.) and consolidates data from:

The main goals of XDR is to reduce incident response times, enable more context during threat inspection, and provide in-depth analysis of affected endpoints to identify the root cause of the threat.

Benefits of endpoint security

How Does Endpoint Protection Work?

Endpoint security relies on a client/server model. There's a centrally managed server that hosts the primary security program (which analyzes threats and makes decisions) and an accompanying client program on each endpoint (which collects data and sends info to the main server).

There are three different strategies based on where you host the primary security program:

No matter where you run the primary endpoint security software, the protection principles stay the same. Programs on endpoints gather data and send it to the central platform which checks the files, processes, and systems for suspicious activity. Platforms primarily detect oddities in two ways:

If the platform discovers a threat, it instructs the endpoint to block traffic and isolate the file from the network. Then the security team investigates the threat (or the platform performs a series of predefined mitigation steps). The endpoint does not connect back to the network until the team eliminates the risk.

Consider boosting your endpoint security with Managed Detection and Response (MDR), an outsourced service that proactively identifies and removes IT threats (and does so at a significantly lower price than what an in-house security team would set you back).

What's the Difference Between Antivirus and Endpoint Security?

An antivirus is a type of cybersecurity software that detects and isolates malicious files (malware, viruses, worms, Trojans, etc.). Endpoint security, on the other hand, is a broader term that encompasses a wider range of measures for protecting endpoints and their associated networks from threats (including malicious software).

Antivirus programs are a subset of endpoint security. No endpoint security strategy is complete without an antivirus (firewalls are the other bare-bones necessity). Even the most basic EPP will have some form of antivirus protection.

Here are the most notable differences between antivirus and endpoint security:

Continue learning about how companies keep systems safe by checking out our in-depth article on the different types of network security.

Endpoint security risks

Features to Look for in an Endpoint Security Tool

Here is a list of features you should expect to get from a top-tier endpoint security tool:

Looking to boost your security levels? Check out our article on the best network security tools on the market and see whether you find a few platforms worth adding to your current tool stack.

Despite Advances, Endpoints Are Still a Go-To Target for Attacks

Modern endpoint security has come a long way from old-school antiviruses and firewalls. Nowadays, platforms provide a far broader set of defenses to counter both known and unknown threats. Despite these advancements, however, endpoints continue to be an enticing target for attacks, so ensure hackers cannot use these devices as an easy-to-crack door into your network.

RTO (Recovery Time Objective) vs RPO (Recovery Point Objective)

While the two metrics may sound alike, Recovery Time Objective (RTO) and Recovery Point Objective (RPO) play entirely different roles in backup and disaster recovery (BDR). Understanding the differences between these metrics (as well as how they work in tandem) is key to surviving revenue-threating incidents without costly downtime or data loss.

This article offers a detailed RTO vs RPO comparison that explains each metric's distinct role in business continuity (BC) planning. Read on to learn what these parameters entail (both in technical and business sense) and see why there's no way to keep business assets safe without a well-defined RTO and RPO.

RTO vs RPO Differences

While they have similar goals, business continuity and disaster recovery are not interchangeable terms. Learn the difference between the two practices in our in-depth business continuity vs disaster recovery comparison.

RTO vs RPO Main Differences

Here's what RTO and RPO stand for:

Both metrics are measurements of time and are vital to effective disaster recovery. Both require comprehensive planning and a proactive security mindset, but there are several noteworthy differences between RTOs and RPOs: 

Together, RTOs and RPOs enable a business to know how long it can afford to be down and how recent the data will be following the recovery. Most companies prefer bouncing back from disruptions as quickly as possible, but the shorter an RTO or RPO is, the cost of recovery goes up (and vice versa).

The best way to guarantee low RTOs and RPOs without expensive upfront investments is to rely on Disaster-Recovery-as-a-Service (DRaaS). No matter what goes wrong, DRaaS ensures you get back to business as usual in minutes rather than hours or days.

What is RTO

A Recovery Time Objective (RTO) represents the time frame within which an IT resource must fully recover from a disruptive event. For example, a system may have an RTO of 30 minutes. In that case, the incident response team has half an hour to bring everything back up and running following an incident.

The RTO "clock" starts ticking when the affected system goes down and ends when the system is fully operational again. Some RTOs start when the responsible team gets a notification about the incident, an approach more common for non-mission-critical systems.

Any system with a defined RTO must also measure the Recovery Time Actual (RTA). RTA represents the actual duration of the recovery process. RTAs and RTOs are rarely identical, but the goal is to keep the RTA within the expected RTO time frame (RTA ≤ RTO).

If the RTA goes past the RTO mark, you can either:

An RTO is typically the same as the maximum downtime a system can tolerate without impacting business continuity. Every system has a different tolerance level for being offline, so there's no need to have a low RTO for every asset. For example, an HR database does not require the same recovery speed as your primary server or a firewall.

If you rely on managed IT services, the provider defines RTO expectations in the Service Level Agreement (SLA). The same document also defines all availability, response time, and resolution time metrics.

RTO timeline

How to Calculate RTO

There's no mathematical formula for calculating an RTO that works for every company or system type. Figuring out an optimal recovery time frame starts with an in-depth risk and business impact analysis (BIA) that examines each asset's unique traits, including:

Once there's an in-depth understanding of the system, the analysis team defines an optimal RTO from an IT perspective. The next step is to consult with the business unit leaders and senior management to determine whether the suggested RTO is viable from a budget standpoint.

In the case of RTOs, faster always means costlier. Any RTO that expects the system to be back online in under an hour requires a steep investment, so do not set low RTOs for every asset. Determining RTOs requires a balancing act between:

More than 72% of companies are unable to meet their RTO expectations. Be realistic when calculating recovery speeds—an impressive RTO that your system or staff cannot meet does not make a difference in times of crisis.

What is RPO

The recovery point objective (RPO) is the maximum amount of data a company is willing to lose during an incident. Teams measure RPOs in hours or minutes since the last working data backup. Once the RPO period passes in a disaster scenario, the quantity of lost data exceeds the maximum allowable threshold.

For example, if a system has an RPO of 3 hours, the team must have a working copy of data not older than 3 hours at all times. In case of a disaster, the affected system can lose up to 3 hours' worth of data without causing long-term issues.

RPOs typically do not apply to archived and historical data. This metric focuses on transactional files and updates that've recently entered a system.

The RPO dictates the frequency a company must create backups to ensure data loss does not exceed the tolerance threshold. The shorter the RPO, the less data is at risk of loss (either permanent or temporary).

Like with RTOs, shorter RPOs require a more significant investment than longer ones. Zero or near-zero RPOs typically require:

These measures are expensive to set up and maintain, so determining RPOs requires the team to find the middle ground between:

Any data set with an RPO should also measure the Recovery Point Actual (RPA). This metric represents the exact amount of lost data during an incident, so your RPA must be lower or equal to the set RPO.

If your RPA fails to meet the RPO, you have two options: lower the RPO expectations or improve your data recovery strategy.

RPO timeline

How to Calculate RPO

Like with RTOs, there are no go-to formulas for determining an RPO that work for every company. Figuring out RPOs requires an in-depth analysis of each data set. Here are the primary factors:

Most companies back up their data at a fixed interval (once an hour, a day, a week, etc.). Here are the four most common RPO time frames and a few usual use cases:

Most data sets that do not fall under one of the categories above require weekly backups. You have two options when choosing how to back up your data:

PhoenixNAP's backup and restore solutions offer state-of-the-art tech that enables you to keep replicas in different geographic regions and meet even the strictest RPOs.

Recovery Time Objective vs Recovery Point Objective

RTO vs RPO: Vital Thresholds for Downtime and Data Loss

Predicting exactly when incidents will occur is impossible, but preparing for unfortunate events is not. Reliable RTOs and RPOs guarantee you control the aftermath of problems and that disruptions do not significantly impact your bottom line. These benefits make setting aside time and resources to prepare RTOs and RPOs a no-brainer decision for most companies.

What is Database Migration and How to Do it Properly

Every business must go through an occasional database migration to optimize costs or enhance service reliability. The problem is that these processes are notoriously difficult—some database migrations take days to complete, and most require some data reformatting or changes in the app's code. There's also the ever-present threat of corrupting data or causing too much service downtime.

This article provides a big-picture view of what a database migration entails and how to create (mostly) painless strategies for moving data between two storage solutions. We also list the most common pitfalls of database migrations to ensure your team is ready to transfer assets without any unpleasant surprises.

Database migrations explained

What is Database Migration?

Database migration is the process of transferring data and workloads from one or more platforms to a better-suited storage solution. Companies perform database migrations for various reasons—here are a few common ones:

Some simpler database migrations involve moving data from one database instance to another storage of the same type (e.g., transferring data from a MySQL database to another MySQL system on a different server). Other migrations, however, are more complex and may involve different types of databases (e.g., moving data from a MySQL database to Cassandra).

A recent study reveals that over 50% of database migrations exceed the predetermined budget or negatively affect the business. Here are the main reasons why database migrations tend to be so challenging:

Read about different database types and see whether one of them offers a better-fitting set of features than your current storage.

Types of Database Migrations

There are two main types of database migrations: big bang and trickle migrations.

Big bang database migrations

A big bang migration moves all data and switches to the new system in a single operation. This migration strategy typically has four steps:

  1. Design phase: The team defines the migration scope, analyzes data samples, and sets a schedule (and a budget).
  2. Development and testing phase: The team prepares for the upcoming migration and runs the necessary testing.
  3. The big bang: The team shuts down the current database and migrates to a new environment. The more data there is, the longer the process takes to complete.
  4. User acceptance testing (UAT): The team verifies the migration results to check if everything works correctly.

This type of database migration always involves some availability issues, and an error often requires the team to repeat the entire process. However, the big bang approach is simple as it happens in a time-boxed (albeit exhaustive) event.

Big bang migrations are the go-to option when the team can define the exact scope from the outset or when other projects dictate the deadlines.

Trickle database migrations

A trickle migration is a more agile-like approach to moving a database. The team breaks down the transfer into sub-migrations, each with its own:

The team confirms the success of each sub-migration individually, which enables a company to re-work only the failed sections in case of an error. However, the drawback of this approach is that the migration takes more time than a big bang. The team must also run two systems simultaneously, which requires extra resources and effort.

The trickle approach is a common choice when the team can logically split the migration into several stages or when the project scope is difficult to define.

Interested in hosting a database on on-site hardware? Our database server price article explains exactly how much you'll have to set aside for such a setup.

Big bang vs trickle database migrations

Database Migration Benefits

Here's a list of the main benefits of performing a database migration:

Looking for a storage system worth migrating to? PhoenixNAP's database servers enable you to host your assets on workload-optimized hardware that's easy to deploy and completely fits your storage needs.

Database Migration Challenges

Here's a list of the most common challenges companies encounter during a database migration:

If these problems seem too challenging for your in-house team, consider relying on Database-as-a-Service (DBaaS). DBaaS is a subscription-based service in which the provider manages the database and delivers your storage as a private cloud service, so you offload the "trickiest" migration-related tasks to a third party.

Database migration best practices

How to Do a Database Migration?

Every database migration is a unique project, but all of them go through a similar multi-step process—let's look at how companies plan a database migration.

Step 1: Pre-Migration

The first step is to form a database migration team. At the very least, you require an expert for the database engine (two of those if the target database has a different engine) and a network specialist well-versed in your servers, ports, and firewall rules. A cybersecurity expert is also a worthwhile addition to the team.

Once you assemble enough talent, the team should define the scope of the upcoming database migration. The team must determine the following:

The migration team must also make early decisions concerning potential migration tools and plan for testing procedures, plus create a high-view framework for the entire process.

Step 2: In-Depth Database Analysis

Once the team knows the migration scope and goals, staff members must analyze the current database. Here's what the migration team must answer:

This phase is also an ideal time to check the existing database for duplicate values, inconsistencies, and incorrect info. Avoid bringing these issues into the new system.

Once the team thoroughly understands the current database, it's time to determine the best option for the target system. The team creates a birds-eye view of how the database migration will unfold for each worthwhile database type. Then, the decision maker picks the target system.

Step 3: A Step-By-Step Migration Plan

Now that the team knows the database migration requirements and what the desired system should look like, it's time to create a detailed, step-by-step migration plan. The team assesses the most efficient way to transfer data and workloads.

This step is also the right time to:

Database schema conversions are often too resource-intensive and time-consuming to perform manually. Most companies opt for a tool to expedite the process.

Some teams opt to test the migration build at this point. Start with a small subset of data, profile it, and convert its schema. This process ensures all mappings, transformations, and quality rules work before you go all-in on the migration process.

Step 4: Database Migration

The team starts the migration process. If the previous steps were successful, this stage goes without any issues (delays, budget overruns, migration failures, etc.).

Most companies perform a database migration at a time they can afford service availability issues, such as on weekends, at night, or on a public holiday. Despite these precautions, most companies nowadays try to outright eliminate service interruptions with database migration tools that offer data synchronization or the Change Data Capture (CDC) functionality.

Step 5: Post-Migration Checkup

Once the database migration ends, the team must analyze the new environment for:

The team then fine-tunes the new database to ensure optimal performance levels, sets up monitoring, and brings the new database to production. The team's decision-maker evaluates whether the new system meets the pre-migration goals.

Depending on the migration plan, this final step may also include the deletion of the original database.

PhoenixNAP offers cost-efficient cloud object storage solutions ideal for Sensitive Data Archiving, Content Distribution and File Sharing, Data Protection, and for Distributing Large Video Files. It's S3-compatible, highly scalable, and can store petabytes of digital content without experiencing performance degradation.

Never Rush into a Database Migration

Database migrations are not something anyone looks forward to, but a slow-and-steady approach to transferring storage takes most of the risk and headaches out of the project. You also remove the pressure off the team the more you prepare, so ensure every migration goes through thorough planning before you go after a more fitting storage solution.

16 Types of Cyber Attacks

In 2021, there were an average of 270 cyber attacks per company, which is a 31% increase from 2020. That figure is not going down in 2022 (if anything, it's more likely to go up), so preparing for cyber threats must be at the top of your to-do list. So, what are the different types of cyber attacks you should be ready to face?

This article examines the most common types of cyber attacks you are most likely to encounter in the current cybercrime landscape. We offer an overview of each threat type, explain how victims fall prey to these tactics, and provide tips for ensuring you are not an easy target for would-be hackers.

Types of cyber attacks

What Is a Cyber Attack?

A cyber attack is a malicious attempt by an unauthorized third party to breach an IT system. Attacks vary in sophistication and tactics, but every effort to "break into" a system has one of the following goals:

A successful cyber attack has a long line of negative effects, including:

Companies are increasingly investing more in security as criminals get more creative and aggressive with their tactics. Recent reports reveal that 69% of US-based firms are expanding their cybersecurity budgets in 2022 (over 85% expect allocated budgets to increase by up to 50%). The current top areas of investment are:

Learn the difference between an attack vector and surface, two overlapping security concepts you must firmly understand to make reliable preparations for malicious activity.

Types of Cyber Security Attacks

A criminal rarely decides to re-invent the wheel when trying to hack a way into a network. Instead, attackers draw upon tried-and-tested techniques they know are highly effective. Let's take a close look at the most common types of cyber attacks a third party might use to breach your company.

Most common types of cyber attacks

1. Malware-Based Attacks (Ransomware, Trojans, Viruses, etc.)

Malware is malicious software that disrupts or steals data from a computer, network, or server. The malware must install on a target device to become active, after which a malicious script moves past the security measures and performs one (or more) of the following actions:

While some malware exploits system vulnerabilities (for example, an issue with UPnP), these programs typically breach a system through human error, such as when the victim:

Malware is one of the most common types of cyber attacks and has multiple variations. Let's look at all the most prominent ones.

Spyware

Spyware is a type of malware that spies on the infected device and sends info to the hacker. Most attackers use this tactic to silently spy on user data and browsing habits.

If the target accesses valuable data on a spyware-infected device (e.g., logging into a bank account), the criminal gathers sensitive info without the victim knowing something's wrong.

Keyloggers

Keyloggers are similar to spyware, except that this type of malware spies on what you type into your keyboard. That info enables a criminal to gather valuable data and later use it for blackmail or identity theft.

Viruses

A computer virus is a malicious program capable of replicating itself by across programs on the target device. If you activate a virus-infected file, the malicious software self-replicates across the device, slowing down performance or destroying data.

Worms

A worm is a standalone malware that replicates itself across different computers. Worms move around via a network, relying on security failures to spread and steal data, set up backdoors, or corrupt files.

Unlike a virus that requires a host computer or operating system, a worm operates alone and does not attach to a host file.

Trojans

Trojans "hide" inside a seemingly legit piece of software (hence the Greek mythology-inspired name). If you install a trojan-infected program, the malware installs on your device and runs malicious code in the background.

Unlike a virus or a worm, a trojan does not replicate itself. The most common goal of a trojan is to establish a silent backdoor within the system that enables remote access.

Adware

Adware is malware that displays marketing content on a target device, such as banners or pop-ups when you visit a website. Some adware also monitors user behavior online, which enables the malicious program to "serve" better-targeted ads.

While adware may seem relatively innocent compared to other malware, many criminals use this tactic to display ads hiding files with malicious code.

Fileless Malware

Fileless malware does not rely on executable files to infect devices or directly impact user data. Instead, this type of malware goes after files native to the operating system (like Microsoft Office macros, PowerShell, WMI, and similar system tools).

Fileless malware is difficult to detect as there are no executables, which are the go-to scanning target for network security tools. Recent studies indicate that the fileless approach is up to 10 times more successful than traditional malware.

Ransomware

Ransomware is a type of malware that encrypts files on a target system. Once the program encrypts data, the hacker demands a ransom (usually requested in cryptos) in exchange for the decryption key.

If the victim declines to pay the ransom, the criminal destroys the decryption key, which means there's (usually) no way to restore data. However, many who opt to meet the demands never receive the promised key. Ransomware code also often corrupts data beyond repair during the infection process, which means the key you receive from the criminal is sometimes useless.

Ransomware is a threat to both individual users and organizations. More tech-savvy criminals prepare malicious packages that attack multiple computers or go after a central server essential to business operations.

Want to learn more about ransomware? Check out these articles:

Our ransomware protection enables you to use various cloud-based solutions to ensure you never end up in a situation where paying a ransom is the only way to get your data back.

2. Phishing Attacks

A phishing attack happens when someone tries to trick a target with a fraudulent email, text (called SMS phishing or "smishing"), or phone call (called voice phishing or "vishing"). These social engineering messages appear to be coming from someone official (like a colleague, bank, a third-party supplier, etc.), but the imposter is actually trying to extract sensitive info from the recipient.

Some criminals do not ask for info directly. A hacker might try to get the victim to click on a link or open an email-attached file that:

Phishing is among the most popular types of cyber attacks. Simple to pull off and highly reliable, recent reports reveal that phishing tactics were a part of 36% of data breaches in 2021.

Many phishing attacks go after as many targets as possible, but some focus on a specific team or person. Let's take a closer look at these more targeted tactics.

Spear Phishing Attacks

Spear phishing goes after a specific individual. The attacker uses personal info about the target (gathered on social media, bought on the Dark Web, or collected via other phishing attacks) to make a more credible message tailored to that person.

Email is by far the most common attack vector for spear phishing. If criminals decide to use an email, they have two choices:

Hackers usually time spear-phishing emails to make a more compelling message. For example, a criminal may wait for the target to go away on a business trip or make a new hire, and create a strategy centered around those unique circumstances.

Angler Phishing Attacks

An Angler attack happens when a phishing imposter targets someone on social media and attempts to steal their credentials outside a corporate network. There are no strict firewall rules or custom IDSes to stop spam messages, which is why this relatively new phishing tactic has had much success in recent years. People also tend to be more off guard on social media than when viewing a message on an official email address.

Whaling Attacks

Whale phishing happens when an attacker goes after a high-profile employee, such as the CEO, COO, or CFO. The idea is to target someone who has the authorization to make major money transfers.

While harder to pull off than trying to trick a lower-ranking employee, whale phishing is the most profitable form of phishing. Profits often reach millions of dollars, so C-level executives must always be on guard for such tactics.

Phishing is a typical first step to CEO fraud. These scams are now a $26-billion-a-year industry, so check out our article on CEO fraud for an in-depth look at how to counter this threat.

3. Password Attacks

Passwords are the most common method of authenticating users when accessing a computer system, which makes them a go-to target for cyber attacks. Stealing someone's credentials enables a hacker to gain entry to data and systems without having to fight through cybersecurity measures.

Recent studies reveal that 20% of data breaches start with a compromised credential. Criminals rely on a variety of methods to get their hands on an individual's passphrase, including using:

Let's explore the most common password-based types of cyber attacks.

Brute-Force Attack

A brute-force attack relies on a program that systematically goes through all the possible combinations of characters to guess a password. The easier the password is, the quicker the program does its job.

This simple method is time-consuming, which is why hackers always use a bot to crack the credentials. Here are the most popular programs attackers rely on to brute-force a passphrase:

Hackers often use basic info about the target to narrow the guessing process, "feeding" the bot with personal data (such as job titles, school names, birthdays, family and pet names, etc.). The program then tests combinations of that data to speed up the deciphering process.

Preventing a brute-force attack does not boil down to using unique passwords. A top-tier program can crack a seven-character password in under 30 seconds. Using lengthy, alphanumerical passwords is the most reliable way of preventing brute-force attacks.

Dictionary Attack

A dictionary attack is a strategy in which a hacker uses a list of common passphrases to gain access to the target's computer or network. Most hackers purchase previously cracked passwords in a bundle on the Dark Web, but some dictionary attacks rely solely on common words and phrases.

Password Spraying

Password spraying is a strategy in which a hacker attempts to use the same password across as many accounts as possible. For example, a bot might crawl across the Internet and try to log into every profile with a "password1" credential.

While not too reliable a tactic at first glance, spraying takes on a new light when you consider over 3.5 million U.S. citizens use "123456" as a password.

Our guide to strong passwords explains a multitude of simple ways to create passwords that are easy to remember and impossible to crack.

4. Man-in-the-Middle Attacks

A man-in-the-middle attack (MitM) occurs when a hacker intercepts in-transit data moving between two network points. An attacker hijacks the session between a client and host, which creates an opportunity to view or edit data. A more common name for the MitM is an eavesdropping attack.

The main problem with MitM attacks is that this breach is very challenging to detect. The victim thinks the info is traveling to a legitimate destination (which it does), but there are often no indications that data made a "pitstop" along the way.

There are two common points of entry for a MitM attack:

For example, let's say you're using the Wi-Fi at a local coffee shop and decide to check your bank account balance. You log in and send info to a bank's server, but a hacker intercepts data and captures your username and password. There's no VPN to protect info, so the hacker gathers everything needed to log into your account and drain all funds.

Want to learn more about the MitM threat? Our article on man-in-the-middle attacks goes through everything your security team needs to know about this strategy.

5. SQL Injection Attacks

An SQL injection enables a hacker to "trick" a website into revealing info stored within its SQL database (login data, passwords, account info, etc.).

Injections are a bit more technical than an average brute-force attack or a phishing strategy, but even a novice hacker knows how to pull these attacks off. The attacker types in predefined SQL commands into a data-entry box (such as a login field). Once injected, commands exploit a weakness in database design and can:

Our article on SQL injections explains precisely how these attacks work and presents the most effective ways to prevent injection attempts.

6. DoS and DDoS Attacks

Denial of Service (DOS) and Distributed Denial of Service (DDoS) are cyber attacks that aim to overwhelm a system, server, or network with fake requests. The attackers spam the target until they exhaust all resources or bandwidth, rendering the system unable to fulfill legitimate requests.

Here's the difference between DOS and DDoS:

The most common types of DoS and DDoS attacks are:

The goal of DOS and DDoS is not to steal data but to slow down operations. Sometimes, a hacker uses a DDoS attack to distract the security team and create a window of opportunity to perform other malicious activities.

Learn about the most effective methods of preventing DDoS attacks and see how the pros ensure hackers cannot overwhelm a system with illegitimate requests.

7. Advanced Persistent Threat (APT)

An APT is a cyber attack in which an intruder maintains a long-term presence within a system without the victim's knowledge. The goal of these attacks varies, but the most common objectives are to:

An APT is more complex than other types of cyber attacks. Criminals often form a full-time team to maintain a months-long presence within the target system. These attacks rarely rely on automation as criminals develop custom programs and tactics for breaching a specific tech stack.

Our article on APT attacks offers an in-depth look at this potentially business-ending threat.

8. Zero-Day Exploits

A zero-day exploit is a security flaw within a piece of software that exists without the admin's knowledge. For example, a company might release a new version of an app with a yet unidentified weakness a hacker can exploit.

Once the team discovers the flaw, they have "zero days" to fix the issue as hackers are likely already working on exploits.

A zero-day exploit is an umbrella term that covers any malicious activity that relies on a still unpatched system weakness. Companies must be wary of zero-day vulnerabilities whenever they update apps or services, so invest in proactive flaw detection and agile threat management.

Learn more about zero-day exploits and see the most effective ways your company should plan for these kinds of vulnerabilities.

9. Watering Hole Attacks

A watering hole attack is a strategy in which a hacker infects a website or sets up a malicious copy of a page a specific user group is likely to visit. This strategy goes after a particular group of end users, so attackers always profile their targets to determine what websites they like to use.

Once the target interacts with the malware-infested website, the intruder gets an opportunity to perform malicious activities (steal login details, inject malware, gain access to the network infrastructure, set up remote controls, etc.).

10. Cryptojacking

Cryptojacking is a cyber attack that enables a hacker to secretly use a computer's processing power to mine for cryptocurrencies (most commonly Bitcoin or Ethereum). Most infections occur when the target:

Cryptojacking severely slows down the system, but it also causes other vulnerabilities. The malicious program often tempers with firewall settings, which creates more space for other threats.

Cases of cryptojacking nearly quadrupled from 2020 to 2021. Recent reports suggest that one in 500 Alexa sites hosts mining malware.

11. URL Manipulation

URL manipulation (or URL rewriting) happens when an attacker changes the parameters in a URL address to redirect the victim to a different website. This tactic typically happens via a malicious script and leads the victim to a phishing or a malware-infected page.

URL manipulation is not URL poisoning (also known as location poisoning). Poisoning an URL means tracking Web visiting behavior by adding an ID number to the URL line when a user goes to a particular site. Hackers then use the ID to track the visitor's browsing history.

Cyber attack statistics

12. DNS-Based Attacks

Domain Name System (DNS) protocol often has exploits that enable a hacker to attempt a cyber attack. Let us look at the two most common ones: DNS tunneling and spoofing.

DNS Tunneling

DNS tunneling uses the protocol to tunnel malware and data through a client-server model while bypassing the firewall and other security measures. Once a malicious program enters the system, it latches onto the server and gives the hacker remote access.

Inbound DNS traffic carries commands to the malware, while outbound traffic enables a hacker to steal data or respond to malware requests (change code, install new access points, etc.).

DNS Spoofing (or "Poisoning")

DNS spoofing enables an attacker to send traffic to a fake (or "spoofed") website and gather data from unwitting visitors. These websites are an identical replica of the legitimate site (typically a copy of a login page for a bank or a social media account) that send info directly to hackers once you type in the credentials.

Hackers also use DNS spoofing to sabotage a business by redirecting visitors to a poor-quality page, often with mature or obscene content. Some companies use this tactic as an underhanded method of taking cheap shots at a competitor's reputation.

Learn about the DNS security best practices and see the best proactive ways to keep your DNS-powered systems healthy.

13. Cross-Site Scripting (XSS)

A cross-site scripting (XSS) attack exploits vulnerable websites and enables a criminal to set up malicious executables on web pages and apps. A hacker injects a payload with malicious JavaScript into a website database which executes as a part of the HTML body when someone requests to open a page in their browser.

When the malicious script executes, the hacker bypasses access controls and hijacks the account. Tech-savvy hackers also use XSS to exploit and create additional security flaws, such as laying the groundwork for malware, taking screenshots, or collecting network data.

15. Rootkits

Rootkits are malicious programs that give an intruder unauthorized admin-level access to a computer or other software. A criminal often uses a rootkit to:

Rootkits are notoriously hard to detect as they "hide" deep within the operating system. Top-tier programs also impact anti-virus settings, making the detection process even more challenging. Most rootkit infections spread through email attachments and drive-by downloads on unsafe websites.

16. Session Hijacking

Session hijacking is an advanced form of a MITM attack in which an imposter takes over a session between a client and the server instead of only spying on the communication. The hacker steals the client's IP address, and the server continues the session because it has already formed a trusted connection with the device.

Once intruders hijack a session, they are free to do anything within the permissions of the victim's account. For example, if a criminal hijacks a session while an admin is accessing a company's database, the attacker can view, edit, or destroy files.

Most security teams focus on external threats when preparing for cyber attacks. In actuality, an insider could do just as much if not more damage than a third-party hacker—learn how to prepare for insider threats and see how smart companies deal with dangers from within the organization.

Preventing cyber attacks

How to Prevent Cyber Attacks?

Let's look at the most effective ways to prevent the different types of cyber attacks discussed above:

Do you rely on in-house hosting? Then your security plan must also include hardware protection—refer to our article on server room design to learn how companies keep on-site infrastructure safe.

The Best Way to Counter Different Types of Cyber Attacks Is to Understand How They Work

Is the goal of this article to make you paranoid? No, but we are trying to make you aware of the different types of cyber attacks you will likely encounter at some point. Once you know how an average hacker thinks, creating an effective protection strategy becomes easier. Use this article to stay a crucial step ahead of would-be criminals looking to make a quick buck off your company.