Passwords have always been one of the quickest ways to gain access to an IT environment. Establishing an initial foothold in the network is the most complex phase of a cyberattack kill chain and an exposed password at even a single endpoint can enable attackers to gain that initial level of access in your network. Almost every security attack involves gaining access to plaintext passwords or hashes at different stages. Password security techniques, such as Multi-Factor Authentication (MFA), have come a long way in improving password security, but threat-actors have always devised new strategies to crack passwords.