Monday, March 16, 2026

Top 5 This Week

Related News

Account recovery becomes a rising cybersecurity risk as identity breaches surge

As organisations deploy stronger login security and multi-factor authentication, cybersecurity researchers are warning that account recovery systems are emerging as a critical weak point in workforce identity protection.

Processes designed to restore employee access — such as password resets, help-desk verification and multi-factor authentication (MFA) re-enrolment — are increasingly being exploited by attackers to gain legitimate access to corporate systems.

In modern enterprises, digital identity has effectively become the gateway to business operations. Employees typically access cloud applications, collaboration platforms and internal databases through single sign-on (SSO) and identity management systems. If attackers successfully compromise one identity, they may be able to move across multiple enterprise services.

Industry data highlights the scale of the challenge. According to cybersecurity research, 69% of organisations have experienced at least one identity-related breach in the past three years, with compromised credentials emerging as a leading cause of security incidents.

At the same time, cloud security studies indicate that more than 80% of cloud breaches involve stolen or abused credentials, underscoring the growing importance of identity security in enterprise environments.

Account recovery workflows have become an attractive target because they often bypass the strict authentication controls used during login. When employees forget passwords or lose access to devices, recovery systems allow credentials or authentication settings to be reset quickly.

However, the same convenience can create opportunities for attackers.

Cybercriminals increasingly rely on social engineering techniques, impersonating employees and contacting IT support teams to request password resets or changes to MFA devices. By convincing service-desk staff that they are legitimate users, attackers can effectively log into corporate systems without triggering traditional security alarms.

Several high-profile incidents have highlighted the risks of such attacks. In recent years, major organisations including MGM Resorts International and Caesars Entertainment experienced disruptive cyberattacks after threat actors reportedly manipulated help-desk processes to obtain access credentials.

Once inside, attackers were able to escalate privileges, access internal systems and disrupt operations.

Security analysts note that the rapid expansion of cloud computing, remote work and SaaS platforms has further amplified the impact of identity breaches. A single compromised employee account may grant access to dozens of applications, including finance systems, customer databases and internal communication tools.

The financial consequences can be significant. Research from IBM estimates the average global cost of a data breach at about $4.88 million, with identity-related attacks often taking months to detect and remediate.

To address the growing threat, organisations are adopting stronger identity security controls. These include phishing-resistant MFA, passwordless authentication, hardware security keys and stricter help-desk verification procedures.

Some companies are also implementing zero-trust security architectures, which require continuous validation of user identity and device security before granting access to corporate resources.

Even so, security experts caution that recovery workflows remain one of the most overlooked areas of enterprise cybersecurity.

As digital identity becomes the central pillar of modern IT infrastructure, attackers are increasingly targeting not just how users log in, but how they regain access when something goes wrong.

Also read: Viksit Workforce for a Viksit Bharat

Do Follow: The Mainstream LinkedIn | The Mainstream Facebook | The Mainstream Youtube | The Mainstream Twitter

About us:

The Mainstream is a premier platform delivering the latest updates and informed perspectives across the technology business and cyber landscape. Built on research-driven, thought leadership and original intellectual property, The Mainstream also curates summits & conferences that convene decision makers to explore how technology reshapes industries and leadership. With a growing presence in India and globally across the Middle East, Africa, ASEAN, the USA, the UK and Australia, The Mainstream carries a vision to bring the latest happenings and insights to 8.2 billion people and to place technology at the centre of conversation for leaders navigating the future.

Popular Articles