Grip Security Workshops: LastPass Breached, Now What?
In this workshop, we demonstrate how to find password managers (like LastPass) in your environment and eliminate duplicate and weak credentials by leveraging Grip.
Give us a test drive.
Fill out the form and we’ll get in touch with you.
Fill out the form and we’ll send you our Datasheet.
Give us a test drive.
Fill out the form and we’ll get in touch with you.
The recently reported breach of LastPass sent many security leaders into a frenzy. And it is easy to see why upon reading a statement from LastPass. WIRED was more pointed, reporting: “A security incident the firm had previously reported (on November 30) was actually a massive and concerning data breach that exposed encrypted password vaults — the crown jewels of any password manager — along with other user data.”
These data included company names, end user names, billing addresses, phone numbers, email addresses, IP addresses (where users come from to access LastPass), and the website and SaaS URLs from password vaults.
While LastPass leans on its Zero-Knowledge architecture, the fact remains that stolen meta data gives threat actors precis user-SaaS relationships and vaults full of duplicate passwords to gain access.
In this workshop, we demonstrate how to find password managers (like LastPass) in your environment and eliminate duplicate and weak credentials by leveraging Grip.
Request a consultation and receive more information about how you can gain visibility to shadow IT and control access to these apps.
Fill out the form and we’ll send you our Datasheet.
Give us a test drive.
Fill out the form and we’ll get in touch with you.
Fill out the form and watch webinar's video.