"My favorite part of attending ICBA Institutes is connecting with peers from other institutions. I look forward to future events knowing familiar faces will be there, and while the training is always excellent, it’s the networking that keeps me coming back."
-McKenzie Humpal, VP Compliance Officer at First Citizens Bank in Iowa
"Through ICBA, I earned the CCBIA, CBAP, and CCBCO designations, each enhancing my role at different stages of my career. Each designation provided valuable resources and insights that improved my expertise in these areas."
-Michael Hoehn, Assistant Compliance Officer and CRA Officer at First Metro Bank in Muscle Shoals, Alabama.
"The Fraud Seminar was excellent and very informative. I got a lot of resources that will help in our FI. Great tools."
-Donna Franklin, AmeriState Bank, Atoka, Ohio
Displaying slide 1 of 3
Unlimited Webinar Pass
One price for the whole bank
Access more than 80 live webinars and more than 100 on-demand webinars for a full 12 month period— all for one low price.
This course explores credential stuffing. Credential stuffing is a
type of cyberattack in which user IDs and passwords obtained from a
data breach on one service are used to attempt to log into another,
unrelated service. You could be a credential stuffing victim if you
use the same user ID and password on multiple services. Learn about
the potential negative effects of a successful credential stuffing
attack, and best practices for IT Departments and employees to
prevent credential stuffing attacks.
Learning Objectives:
Summarize what credential stuffing is
Describe how a credential stuffing attack works
Outline what IT Department and individual employees can do to
reduce the probability of a successful credential stuffing attack