Information Technology Professionals - IT Pros USA


ITP Talks Cybersecurity at Forward Fest 2019

A Username and Password is All a Hacker Needs

According to Verizon’s annual Data Breach Investigations Report, stolen login credentials are by far the most common way hackers breach corporate data.

Forward Fest Hacker's Havoc Happy HourBut logging in to a network with legitimate credentials isn’t exactly rocket science or sophisticated. In fact, it’s a very basic way to break in. So why is this simple tactic so common? Because login credentials are easy to obtain on the dark web or by phishing.

Learn how to safeguard your data with best practices and tools at Hacker’s Havoc Happy Hour. This special FREE event is hosted by ITP as part of the 2019 Forward Festival.

Are You Sure Your Data is Safe?

Your business login credentials are like the keys to your company’s front door. You wouldn’t give your house keys to some shifty stranger on the street. Yet many people do exactly that when they don’t consider the cybersecurity consequences of their actions.

Are you guilty of any of these “credential crimes”?

Having weak passwords that are easy to guess

You may already know that “password” and “12345” aren’t strong passwords. But even simple words and phrases like “iloveyou” and “sunshine” are poor password choices.

Is your password on the naughty list? Want to create a stronger password? Read Worst Passwords of 2018.

Using the same password for everything

Pretty self-explanatory, right? Once a hacker knows your one and only password, you’re toast.

Using your business login credentials on other sites

Even if your company’s security is phenomenal, it can’t prevent employees from using their business login credentials on websites with poor security where their information can be stolen.

Roughly half of users will use their business email address and business password in a personal account somewhere else on the internet. If one of those sites is hacked, your business login credentials are now in the hands of bad actors.

Giving your credentials to a hacker through a phishing attack

Phishing emails can be tough to spot since they’re designed to sound and look legitimate. They’ll appear to come from a person or business you trust. But anytime an email asks you for personal information like a cell phone number or login credentials, beware. Call or send a fresh email to the person the email claims to be from and confirm they sent the original email.

Join Us for Hacker’s Havoc Happy Hour

Dale Harkness

Dale Harkness

Paul Hager

Paul Hager

ITP’s cybersecurity experts – including Paul Hager and Dale Harkness – will discuss the current cyber threats impacting small and medium-sized businesses.

They’ll also share how organizations can keep their login credentials off the dark web and better protect their data.

Learn answers to questions such as:

  • What information is safe to share online?
  • How do I know if my personal data is on the dark web?
  • What should I do if it is?
  • What are some best practices everyone in my company should be using?


About Forward Festival

Now in its 10th year, Forward Festival is Madison’s flagship technology and entrepreneurship festival. It attracts more than 5,000 attendees and includes 8 full days packed with 40+ events on topics such as:

  • Innovation
  • Attracting and retaining employees
  • How to build a business out of an idea
  • Programming and coding
  • Data-driven decisions
  • Leadership
  • Technology
  • Marketing and social media
  • And much more

Meet fellow entrepreneurs, nerds, designers, geeks, hackers, foodies, and creative professionals from the Midwest in a celebration of innovation and entrepreneurship.

Learn more at

Additional Resources

Free Dark Web Scan

INFOGRAPHIC: Cybersecurity Exposed Credentials

The ITP Approach to Layered Security

What Shrek Can Teach You About Cybersecurity


Get Started

Share This