Why Passwords Still Matter


Passwords are a fundamental aspect of cybersecurity, and whilst for now, passwords are here to stay, it is unlikely most organisations can go fully password-less.

As highlighted in our previous blog regarding How Multi-factor Authentication (MFA) Can be Breached, MFA simply isn’t enough of a security measure to then forget about the importance of password security and weak, default or breached passwords.

Weak, default or breached passwords are one of the biggest threats to a user and/or business. Account compromises usually start with the threat actor discovering a user’s credentials from dictionary attacks to password spraying. Once the threat actor has obtained a password, they will then move their focus on compromising MFA. Once they overcome these lines of defence, they will then conduct lateral movements across a trusted environment to access valuable assets such as sensitive data, and may proceed to harvest, encrypt, and/or delete that data.

A weak password dramatically increases the chances of the threat actor ultimately breaching accounts. Strong passwords offer no protection if that password has already been compromised. There are several legitimate websites which you can search to see if your password has been compromised and leaked online. However, the simple rule of thumb is to avoid using weak or default passwords for accessing multiple systems and to enforce a strong password policy and ensure regular password changes.

MFA is then the additional layer of security it’s intended to be.

 


Unseen Weak Points in Your Cybersecurity

29 September 2025

In this month’s IT Bulletin, we're uncovering three subtle but significant risks that could be undermining your cybersecurity strategy. From overlooked permissions in your apps to the consequences of mismanaged guest accounts and the dangers of unsecured backups, these threats often go unnoticed until it's too late. Here's what you need to know:

How CQi Automates CAD Deployments and Reduces Risk

05 September 2025

In modern Architecture, engineering, construction and design environments, the pressure is on IT teams to deliver fast, consistent, and secure software setups. Whether you're supporting ten users or ten thousand, manual installation methods simply can’t keep up with the demands of large-scale CAD environments. That’s where CQi (Configuration Intelligence)steps in. At Symetri, we developed CQi to help organisations automate CAD deployment, reduce risk, and maintain standardisation—all without increasing the burden on IT departments. In this blog, we’ll explore how CQi works and why it’s becoming a go-to solution for smarter CAD management.