It must be remembered that a vast amount of personal and financial information is stored in digital systems worldwide. With the common practice of reusing credentials, a single compromised account can open the door to multiple services—or even enable full-scale identity theft by piecing together leaked data from email, cloud storage, and online accounts. Collaboration platforms and SaaS tools have also become frequent targets, making strong authentication more critical than ever.
Passwords and authentication – Simple, short passwords are no longer sufficient. An “eight-character minimum” is now considered insecure. Following NIST 800-63B guidance, the current best practice in 2025 is to require at least 12 characters in a password, while moving away from mandatory complexity rules (such as forcing symbols in every password). Instead, organisations are encouraged to promote long, memorable passphrases that balance usability with security.
Protecting against brute force attacks – The risk of simple brute-force guessing has been reduced through widespread use of multi-factor authentication (MFA), which is now a standard requirement in most sectors. Older SMS-based one-time codes are being phased out in favor of more secure options such as FIDO2 and WebAuthn, which use hardware tokens, biometrics, or device-based credentials. In addition, rate-limiting systems block repeated failed login attempts, and behavioral biometrics (like typing speed and mouse movement analysis) are increasingly deployed to spot unusual or fraudulent activity.
Data protection and insight – Hashing and salting passwords remains a core safeguard to ensure that even if a database is compromised, the original credentials are not exposed. Blueberry’s solutions go further by checking new passwords against databases of known weak or breached credentials, and by flagging common, easily guessed patterns (e.g., “password123”). This proactive stance helps businesses defend against modern attack vectors while maintaining user convenience.
By combining stronger authentication, smarter monitoring, and advanced AI-driven fraud detection, today’s access control strategies provide resilience against threats ranging from credential stuffing to sophisticated social engineering, enabling businesses to protect both their systems and their customers with far greater confidence.